Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2021-42327
Vulnerability from cvelistv5
Published
2021-10-21 00:00
Modified
2024-08-04 03:30
Severity ?
EPSS score ?
0.89%
(0.74259)
Summary
dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T03:30:38.271Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c", }, { tags: [ "x_transferred", ], url: "https://www.mail-archive.com/amd-gfx%40lists.freedesktop.org/msg69080.html", }, { name: "FEDORA-2021-a093973910", tags: [ "vendor-advisory", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20211118-0005/", }, { tags: [ "x_transferred", ], url: "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f23750b5b3d98653b31d4469592935ef6364ad67", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2024-03-25T00:39:39.457080", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c", }, { url: "https://www.mail-archive.com/amd-gfx%40lists.freedesktop.org/msg69080.html", }, { name: "FEDORA-2021-a093973910", tags: [ "vendor-advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/", }, { url: "https://security.netapp.com/advisory/ntap-20211118-0005/", }, { url: "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f23750b5b3d98653b31d4469592935ef6364ad67", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2021-42327", datePublished: "2021-10-21T00:00:00", dateReserved: "2021-10-12T00:00:00", dateUpdated: "2024-08-04T03:30:38.271Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2021-42327\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-10-21T17:15:07.913\",\"lastModified\":\"2024-11-21T06:27:36.903\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.\"},{\"lang\":\"es\",\"value\":\"la función dp_link_settings_write en el archivo drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c en el kernel de Linux versiones hasta 5.14.14, permite un desbordamiento de búfer en la región heap de la memoria por parte de un atacante que puede escribir una cadena en el sistema de archivos de depuración de los controladores de la GPU AMD. No se presentan comprobaciones de tamaño dentro de parse_write_buffer_into_params cuando usa el tamaño de copy_from_user para copiar un buffer de espacio de usuario en un buffer de pila de 40 bytes\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.14.14\",\"matchCriteriaId\":\"9CE21C53-A076-452E-9E54-04F00E3756C4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6770B6C3-732E-4E22-BF1C-2D2FD610061C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9C8C20-42EB-4AB5-BD97-212DEB070C43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FFF7106-ED78-49BA-9EC5-B889E3685D53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E63D8B0F-006E-4801-BF9D-1C001BBFB4F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56409CEC-5A1E-4450-AA42-641E459CC2AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06F4839-D16A-4A61-9BB5-55B13F41E47F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"108A2215-50FB-4074-94CF-C130FA14566D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AFC73CE-ABB9-42D3-9A71-3F5BC5381E0E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32F0B6C0-F930-480D-962B-3F4EFDCC13C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"803BC414-B250-4E3A-A478-A3881340D6B8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FEB3337-BFDE-462A-908B-176F92053CEC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"736AEAE9-782B-4F71-9893-DED53367E102\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0B4AD8A-F172-4558-AEC6-FF424BA2D912\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8497A4C9-8474-4A62-8331-3FE862ED4098\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDDF61B7-EC5C-467C-B710-B89F502CD04F\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f23750b5b3d98653b31d4469592935ef6364ad67\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20211118-0005/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.mail-archive.com/amd-gfx%40lists.freedesktop.org/msg69080.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f23750b5b3d98653b31d4469592935ef6364ad67\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20211118-0005/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.mail-archive.com/amd-gfx%40lists.freedesktop.org/msg69080.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", }, }
suse-su-2024:2008-1
Vulnerability from csaf_suse
Published
2024-06-12 11:33
Modified
2024-06-12 11:33
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)
- CVE-2022-48689: Fixed data-race in lru_add_fn (bsc#1223959)
- CVE-2022-48691: Fixed memory leak in netfilter (bsc#1223961)
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
- CVE-2023-42755: Check user supplied offsets (bsc#1215702).
- CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).
- CVE-2023-52618: Fixed string overflow in block/rnbd-srv (bsc#1221615).
- CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187).
- CVE-2023-52660: Fiedx IRQ handling due to shared interrupts (bsc#1224443).
- CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).
- CVE-2023-52671: Fixed hang/underflow when transitioning to ODM4:1 (bsc#1224729).
- CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put() (bsc#1224727).
- CVE-2023-52680: Fixed missing error checks to *_ctl_get() (bsc#1224608).
- CVE-2023-52692: Fixed missing error check to scarlett2_usb_set_config() (bsc#1224628).
- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (CVE-2023-52698 bsc#1224621)
- CVE-2023-52746: Prevent potential spectre v1 gadget in xfrm_xlate32_attr() (bsc#1225114)
- CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548).
- CVE-2023-52795: Fixed use after free in vhost_vdpa_probe() (bsc#1225085).
- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
- CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce info is read via debugfs (bsc#1225097).
- CVE-2023-52860: Fixed null pointer dereference in hisi_hns3 (bsc#1224936).
- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
- CVE-2024-26643: Fixed mark set as dead when unbinding anonymous set with timeout (bsc#1221829).
- CVE-2024-26679: Fixed read sk->sk_family once in inet_recv_error() (bsc#1222385).
- CVE-2024-26692: Fixed regression in writes when non-standard maximum write size negotiated (bsc#1222464).
- CVE-2024-26715: Fixed NULL pointer dereference in dwc3_gadget_suspend (bsc#1222561).
- CVE-2024-26742: Fixed disable_managed_interrupts (git-fixes bsc#1222608).
- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
- CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)
- CVE-2024-26822: Set correct id, uid and cruid for multiuser automounts (bsc#1223011).
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).
- CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).
- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)
- CVE-2024-26919: Fixed debugfs directory leak (bsc#1223847).
- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
- CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390).
- CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532).
- CVE-2024-26939: Fixed UAF on destroy against retire race (bsc#1223679).
- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
- CVE-2024-27042: Fixed potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' (bsc#1223823).
- CVE-2024-27395: Fixed Use-After-Free in ovs_ct_exit (bsc#1224098).
- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181).
- CVE-2024-27417: Fixed potential 'struct net' leak in inet6_rtm_getaddr() (bsc#1224721)
- CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759)
- CVE-2024-27431: Fixed Zero-initialise xdp_rxq_info struct before running XDP program (bsc#1224718).
- CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725).
- CVE-2024-35799: Prevent crash when disable stream (bsc#1224740).
- CVE-2024-35804: Mark target gfn of emulated atomic instruction as dirty (bsc#1224638).
- CVE-2024-35852: Fixed memory leak when canceling rehash work (bsc#1224502).
- CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636).
- CVE-2024-35860: struct bpf_link and bpf_link_ops kABI workaround (bsc#1224531).
- CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766).
- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).
- CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763).
- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765).
- CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break() (bsc#1224668).
- CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key() (bsc#1224667).
- CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664).
- CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678).
- CVE-2024-35869: Guarantee refcounted children from parent session (bsc#1224679).
- CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224672).
- CVE-2024-35872: Fixed GUP-fast succeeding on secretmem folios (bsc#1224530).
- CVE-2024-35875: Require seeding RNG with RDRAND on CoCo systems (bsc#1224665).
- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671).
- CVE-2024-35879: kABI workaround for drivers/of/dynamic.c (bsc#1224524).
- CVE-2024-35885: Stop interface during shutdown (bsc#1224519).
- CVE-2024-35904: Fixed dereference of garbage after mount failure (bsc#1224494).
- CVE-2024-35905: Fixed int overflow for stack access size (bsc#1224488).
- CVE-2024-35907: Call request_irq() after NAPI initialized (bsc#1224492).
- CVE-2024-35924: Limit read size on v1.2 (bsc#1224657).
- CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure (bsc#1224535).
- CVE-2024-35943: Fixed a null pointer dereference in omap_prm_domain_init (bsc#1224649).
- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648).
- CVE-2024-35951: Fixed the error path in panfrost_mmu_map_fault_addr() (bsc#1224701).
- CVE-2024-35959: Fixed mlx5e_priv_init() cleanup flow (bsc#1224666).
- CVE-2024-35964: Fixed not validating setsockopt user input (bsc#1224581).
- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580).
- CVE-2024-35973: Fixed header validation in geneve[6]_xmit_skb (bsc#1224586).
- CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (bsc#1224575).
- CVE-2024-35998: Fixed lock ordering potential deadlock in cifs_sync_mid_result (bsc#1224549).
- CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550).
- CVE-2024-36006: Fixed incorrect list API usage (bsc#1224541).
- CVE-2024-36007: Fixed warning during rehash (bsc#1224543).
- CVE-2024-36938: Fixed NULL pointer dereference in sk_psock_skb_ingress_enqueue (bsc#1225761).
The following non-security bugs were fixed:
- 9p: explicitly deny setlease attempts (git-fixes).
- ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes).
- ACPI: disable -Wstringop-truncation (git-fixes).
- ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes).
- ACPI: LPSS: Advertise number of chip selects via property (git-fixes).
- admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET (git-fixes).
- af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384).
- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- ALSA: core: Fix NULL module pointer assignment at card init (git-fixes).
- ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes).
- ALSA: line6: Zero-initialize message buffers (stable-fixes).
- ARM: 9381/1: kasan: clear stale stack poison (git-fixes).
- ASoC: Intel: avs: Fix ASRC module initialization (git-fixes).
- ASoC: Intel: avs: Fix potential integer overflow (git-fixes).
- ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes).
- ASoC: Intel: Disable route checks for Skylake boards (git-fixes).
- ASoC: kirkwood: Fix potential NULL dereference (git-fixes).
- ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes).
- ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes).
- ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes).
- ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes).
- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
- ata: pata_legacy: make legacy_exit() work again (git-fixes).
- ata: sata_gemini: Check clk_enable() result (stable-fixes).
- autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166).
- Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes).
- Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor() (git-fixes).
- Bluetooth: hci_sync: Do not double print name in add/remove adv_monitor (bsc#1216358).
- Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes).
- Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes).
- Bluetooth: qca: add missing firmware sanity checks (git-fixes).
- Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes).
- Bluetooth: qca: fix firmware check error path (git-fixes).
- Bluetooth: qca: fix info leak when fetching fw build id (git-fixes).
- Bluetooth: qca: fix NVM configuration parsing (git-fixes).
- bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git-fixes)
- bpf: decouple prune and jump points (bsc#1225756).
- bpf: fix precision backtracking instruction iteration (bsc#1225756).
- bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes).
- bpf: handle ldimm64 properly in check_cfg() (bsc#1225756).
- bpf: mostly decouple jump history management from is_state_visited() (bsc#1225756).
- bpf: remove unnecessary prune and jump points (bsc#1225756).
- btrfs: add error messages to all unrecognized mount options (git-fixes)
- btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes)
- btrfs: export: handle invalid inode or root reference in btrfs_get_parent() (git-fixes)
- btrfs: extend locking to all space_info members accesses (git-fixes)
- btrfs: fix btrfs_submit_compressed_write cgroup attribution (git-fixes)
- btrfs: fix fallocate to use file_modified to update permissions consistently (git-fixes)
- btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes)
- btrfs: fix missing blkdev_put() call in btrfs_scan_one_device() (git-fixes)
- btrfs: fix off-by-one chunk length calculation at contains_pending_extent() (git-fixes)
- btrfs: fix qgroup reserve overflow the qgroup limit (git-fixes)
- btrfs: fix silent failure when deleting root reference (git-fixes)
- btrfs: fix use-after-free after failure to create a snapshot (git-fixes)
- btrfs: free exchange changeset on failures (git-fixes)
- btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git-fixes)
- btrfs: make search_csum_tree return 0 if we get -EFBIG (git-fixes)
- btrfs: prevent copying too big compressed lzo segment (git-fixes)
- btrfs: remove BUG_ON(!eie) in find_parent_nodes (git-fixes)
- btrfs: remove BUG_ON() in find_parent_nodes() (git-fixes)
- btrfs: repair super block num_devices automatically (git-fixes)
- btrfs: replace the BUG_ON in btrfs_del_root_ref with proper error handling (git-fixes)
- btrfs: send: ensure send_fd is writable (git-fixes)
- btrfs: send: handle path ref underflow in header iterate_inode_ref() (git-fixes)
- btrfs: send: in case of IO error log it (git-fixes)
- btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes)
- btrfs: tree-checker: check item_size for dev_item (git-fixes)
- btrfs: tree-checker: check item_size for inode_item (git-fixes)
- cifs: account for primary channel in the interface list (bsc#1224020).
- cifs: cifs_chan_is_iface_active should be called with chan_lock held (bsc#1224020).
- cifs: distribute channels across interfaces based on speed (bsc#1224020).
- cifs: do not pass cifs_sb when trying to add channels (bsc#1224020).
- cifs: failure to add channel on iface should bump up weight (git-fixes, bsc#1224020).
- cifs: fix charset issue in reconnection (bsc#1224020).
- cifs: fix leak of iface for primary channel (git-fixes, bsc#1224020).
- cifs: handle cases where a channel is closed (bsc#1224020).
- cifs: handle cases where multiple sessions share connection (bsc#1224020).
- cifs: reconnect work should have reference on server struct (bsc#1224020).
- clk: Do not hold prepare_lock when calling kref_put() (stable-fixes).
- clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes).
- counter: stm32-lptimer-cnt: Provide defines for clock polarities (git-fixes).
- counter: stm32-timer-cnt: Provide defines for slave mode selection (git-fixes).
- cppc_cpufreq: Fix possible null pointer dereference (git-fixes).
- cpu/hotplug: Remove the 'cpu' member of cpuhp_cpu_state (git-fixes).
- cpumask: Add for_each_cpu_from() (bsc#1225053).
- crypto: bcm - Fix pointer arithmetic (git-fixes).
- crypto: ccp - drop platform ifdef checks (git-fixes).
- crypto: ecdsa - Fix module auto-load on add-key (git-fixes).
- crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes).
- crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes).
- crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes).
- dmaengine: axi-dmac: fix possible race in remove() (git-fixes).
- dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes).
- dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11 users (git-fixes).
- dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575).
- docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes).
- drivers/nvme: Add quirks for device 126f:2262 (git-fixes).
- drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes).
- drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes).
- drm/amd/display: Fix potential index out of bounds in color transformation function (git-fixes).
- drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes).
- drm/amd: Flush GFXOFF requests in prepare stage (git-fixes).
- drm/amdgpu: Refine IB schedule error logging (stable-fixes).
- drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git-fixes).
- drm/arm/malidp: fix a possible null pointer dereference (git-fixes).
- drm/bridge: anx7625: Do not log an error when DSI host can't be found (git-fixes).
- drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git-fixes).
- drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: icn6211: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: lt9611: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: tc358775: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes).
- drm/connector: Add \n to message about demoting connector force-probes (git-fixes).
- drm/i915/bios: Fix parsing backlight BDB data (git-fixes).
- drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes).
- drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes).
- drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes).
- drm/meson: dw-hdmi: power up phy on device init (git-fixes).
- drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes).
- drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes).
- drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes).
- drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk (git-fixes).
- drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes).
- drm/panel: atna33xc20: Fix unbalanced regulator in the case HPD does not assert (git-fixes).
- drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found (git-fixes).
- drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector (git-fixes).
- drm: vc4: Fix possible null pointer dereference (git-fixes).
- dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes)
- dyndbg: fix old BUG_ON in >control parser (stable-fixes).
- efi: libstub: only free priv.runtime_map when allocated (git-fixes).
- extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes).
- fail_function: fix wrong use of fei_attr_remove().
- fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes).
- fbdev: shmobile: fix snprintf truncation (git-fixes).
- fbdev: sisfb: hide unused variables (git-fixes).
- firewire: ohci: mask bus reset interrupts between ISR and bottom half (stable-fixes).
- firmware: dmi-id: add a release callback function (git-fixes).
- firmware: raspberrypi: Use correct device for DMA mappings (git-fixes).
- fs/9p: drop inodes immediately on non-.L too (git-fixes).
- fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes).
- fs/9p: translate O_TRUNC into OTRUNC (git-fixes).
- gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes).
- gpio: wcove: Use -ENOTSUPP consistently (stable-fixes).
- gpu: host1x: Do not setup DMA for virtual devices (stable-fixes).
- HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes).
- hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git-fixes).
- hwmon: (corsair-cpro) Use a separate buffer for sending commands (git-fixes).
- hwmon: (corsair-cpro) Use complete_all() instead of complete() in ccp_raw_event() (git-fixes).
- hwmon: (lm70) fix links in doc and comments (git-fixes).
- hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes).
- i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame (git-fixes).
- i3c: master: svc: fix invalidate IBI type and miss call client IBI handler (git-fixes).
- IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes)
- idpf: extend tx watchdog timeout (bsc#1224137).
- iio: core: Leave private pointer NULL when no private data supplied (git-fixes).
- iio: pressure: dps310: support negative temperature values (git-fixes).
- Input: cyapa - add missing input core locking to suspend/resume functions (git-fixes).
- Input: ims-pcu - fix printf string overflow (git-fixes).
- Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes).
- iomap: Fix inline extent handling in iomap_readpage (git-fixes)
- iomap: iomap: fix memory corruption when recording errors during writeback (git-fixes)
- iomap: Support partial direct I/O on user copy failures (git-fixes)
- iommu/dma: Force swiotlb_max_mapping_size on an untrusted device (bsc#1224331)
- io_uring/unix: drop usage of io_uring socket (git-fixes).
- irqchip/gic-v3-its: Prevent double free on error (git-fixes).
- jffs2: prevent xattr node from overflowing the eraseblock (git-fixes).
- kABI: bpf: struct bpf_insn_aux_data kABI workaround (bsc#1225756).
- kcm: do not sense pfmemalloc status in kcm_sendpage() (git-fixes bsc#1223959)
- KEYS: trusted: Do not use WARN when encode fails (git-fixes).
- KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes).
- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1224794).
- KVM: x86: Delete duplicate documentation for KVM_X86_SET_MSR_FILTER (git-fixes).
- leds: pwm: Disable PWM when going to suspend (git-fixes).
- libsubcmd: Fix parse-options memory leak (git-fixes).
- locking/atomic: Make test_and_*_bit() ordered on failure (git-fixes).
- media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries (git-fixes).
- media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes).
- media: mc: mark the media devnode as registered from the, start (git-fixes).
- media: ngene: Add dvb_ca_en50221_init return value check (git-fixes).
- media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes).
- mei: me: add lunar lake point M DID (stable-fixes).
- mfd: intel-lpss: Revert 'Add missing check for platform_get_resource' (git-fixes).
- mfd: ti_am335x_tscadc: Support the correctly spelled DT property (git-fixes).
- mfd: tqmx86: Specify IO port register range more precisely (git-fixes).
- mlxbf_gige: Enable the GigE port in mlxbf_gige_open (git-fixes).
- mlxbf_gige: Fix intermittent no ip issue (git-fixes).
- mlxbf_gige: stop PHY during open() error paths (git-fixes).
- mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes).
- mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes).
- mtd: core: Report error if first mtd_otp_size() call fails in mtd_otp_nvmem_add() (git-fixes).
- mtd: rawnand: hynix: fixed typo (git-fixes).
- net: do not sense pfmemalloc status in skb_append_pagefrags() (git-fixes bsc#1223959)
- netfilter: nf_tables: bail out early if hardware offload is not supported (git-fixes bsc#1223961)
- net: introduce __skb_fill_page_desc_noacc (git-fixes bsc#1223959)
- net: nfc: remove inappropriate attrs check (stable-fixes).
- net: qualcomm: rmnet: fix global oob in rmnet_policy (git-fixes).
- net: usb: ax88179_178a: fix link status when link is set to down/up (git-fixes).
- net:usb:qmi_wwan: support Rolling modules (stable-fixes).
- net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).
- net: usb: sr9700: stop lying about skb->truesize (git-fixes).
- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).
- nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git-fixes).
- nfc: nci: Fix uninit-value in nci_rx_work (git-fixes).
- nilfs2: fix out-of-range warning (git-fixes).
- nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes).
- nilfs2: fix use-after-free of timer for log writer thread (git-fixes).
- nilfs2: make superblock data array index computation sparse friendly (git-fixes).
- nvme: ensure disabling pairs with unquiesce (bsc#1224534).
- nvme: fix miss command type check (git-fixes).
- nvme: fix multipath batched completion accounting (git-fixes).
- nvme-multipath: fix io accounting on failover (git-fixes).
- nvmet: fix ns enable/disable possible hang (git-fixes).
- PCI: dwc: Detect iATU settings after getting 'addr_space' resource (git-fixes).
- PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host (git-fixes).
- PCI: dwc: Use the bitmap API to allocate bitmaps (git-fixes).
- PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes).
- PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes).
- PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes).
- PCI: tegra194: Fix probe path for Endpoint mode (git-fixes).
- pinctrl: armada-37xx: remove an unused variable (git-fixes).
- pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes).
- pinctrl: core: handle radix_tree_insert() errors in pinctrl_register_one_pin() (stable-fixes).
- pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes).
- pinctrl/meson: fix typo in PDM's pin name (git-fixes).
- pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git-fixes).
- platform/x86/intel-uncore-freq: Do not present root domain on error (git-fixes).
- platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git-fixes).
- powerpc/eeh: Permanently disable the removed device (bsc#1223991 ltc#205740).
- powerpc/eeh: Small refactor of eeh_handle_normal_event() (bsc#1223991 ltc#205740).
- powerpc/eeh: Use a goto for recovery failures (bsc#1223991 ltc#205740).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).
- powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783).
- powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869).
- powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869).
- power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes).
- ppdev: Add an error check in register_device (git-fixes).
- printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1225616).
- qibfs: fix dentry leak (git-fixes)
- RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git-fixes)
- RDMA/hns: Fix deadlock on SRQ async events. (git-fixes)
- RDMA/hns: Fix GMV table pagesize (git-fixes)
- RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes)
- RDMA/hns: Fix UAF for cq async event (git-fixes)
- RDMA/hns: Modify the print level of CQE error (git-fixes)
- RDMA/hns: Use complete parentheses in macros (git-fixes)
- RDMA/IPoIB: Fix format truncation compilation errors (git-fixes)
- RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes)
- RDMA/mlx5: Fix port number for counter query in multi-port configuration (git-fixes)
- RDMA/rxe: Add ibdev_dbg macros for rxe (git-fixes)
- RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes)
- RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes)
- RDMA/rxe: Fix the problem 'mutex_destroy missing' (git-fixes)
- RDMA/rxe: Replace pr_xxx by rxe_dbg_xxx in rxe_net.c (git-fixes)
- RDMA/rxe: Split rxe_run_task() into two subroutines (git-fixes)
- regulator: bd71828: Do not overwrite runtime voltages (git-fixes).
- regulator: core: fix debugfs creation regression (git-fixes).
- regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes).
- remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes).
- Rename colliding patches before origin/cve/linux-5.14-LTSS -> SLE15-SP5 merge
- Revert 'cifs: reconnect work should have reference on server struct' (git-fixes, bsc#1224020).
- Revert 'drm/bridge: ti-sn65dsi83: Fix enable error path' (git-fixes).
- ring-buffer: Fix a race between readers and resize checks (git-fixes).
- s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224795).
- s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224796).
- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224346).
- s390/ipl: Fix incorrect initialization of len fields in nvme reipl block (git-fixes bsc#1225139).
- s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes bsc#1225138).
- sched/topology: Optimize topology_span_sane() (bsc#1225053).
- scsi: arcmsr: Support new PCI device IDs 1883 and 1886 (git-fixes).
- scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes).
- scsi: core: Consult supported VPD page list prior to fetching page (git-fixes).
- scsi: core: Fix unremoved procfs host directory regression (git-fixes).
- scsi: csiostor: Avoid function pointer casts (git-fixes).
- scsi: libfc: Do not schedule abort twice (git-fixes).
- scsi: libfc: Fix up timeout error in fc_fcp_rec_error() (git-fixes).
- scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842).
- scsi: lpfc: Change default logging level for unsolicited CT MIB commands (bsc#1225842).
- scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842).
- scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading (bsc#1225842).
- scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842).
- scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list (bsc#1225842).
- scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842).
- scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842).
- scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git-fixes).
- scsi: mylex: Fix sysfs buffer lengths (git-fixes).
- scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes).
- scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git-fixes).
- selftests/pidfd: Fix config for pidfd_setns_test (git-fixes).
- serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes).
- serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable-fixes).
- serial: max3100: Fix bitwise types (git-fixes).
- serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git-fixes).
- serial: max3100: Update uart_driver_registered on driver removal (git-fixes).
- serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git-fixes).
- serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler (git-fixes).
- serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes).
- smb3: show beginning time for per share stats (bsc#1224020).
- smb: client: ensure to try all targets when finding nested links (bsc#1224020).
- smb: client: fix mount when dns_resolver key is not available (git-fixes, bsc#1224020).
- smb: client: get rid of dfs code dep in namespace.c (bsc#1224020).
- smb: client: get rid of dfs naming in automount code (bsc#1224020).
- smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1224020).
- smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1224020).
- smb: client: remove extra @chan_count check in __cifs_put_smb_ses() (bsc#1224020).
- smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1224020).
- soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes).
- soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes).
- Sort recent BHI patches
- speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes).
- spmi: Add a check for remove callback when removing a SPMI driver (git-fixes).
- spmi: hisi-spmi-controller: Do not override device identifier (git-fixes).
- swiotlb: extend buffer pre-padding to alloc_align_mask if necessary (bsc#1224331).
- swiotlb: Fix alignment checks when both allocation and DMA masks are (bsc#1224331)
- swiotlb: Fix double-allocation of slots due to broken alignment (bsc#1224331)
- swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() (bsc#1224331)
- sysv: do not call sb_bread() with pointers_lock held (git-fixes).
- thermal/drivers/tsens: Fix null pointer dereference (git-fixes).
- tools/latency-collector: Fix -Wformat-security compile warns (git-fixes).
- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer (bsc#1225535)
- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (git-fixes).
- tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes).
- tracing: hide unused ftrace_event_id_fops (git-fixes).
- tty: n_gsm: fix missing receive state reset after mode switch (git-fixes).
- tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes).
- Update patches.suse/ring-buffer-Fix-a-race-between-readers-and-resize-checks.patch (bsc#1222893).
- Update patches.suse/scsi-qedf-Don-t-process-stag-work-during-unload.patch (bsc#1214852)
- Update patches.suse/scsi-qedf-Wait-for-stag-work-during-unload.patch (bsc#1214852)
- usb: aqc111: stop lying about skb->truesize (git-fixes).
- USB: core: Add hub_get() and hub_put() routines (git-fixes).
- USB: core: Fix access violation during port device removal (git-fixes).
- USB: core: Fix deadlock in port 'disable' sysfs attribute (git-fixes).
- usb: dwc3: core: Prevent phy suspend during init (Git-fixes).
- usb: gadget: u_audio: Clear uac pointer when freed (git-fixes).
- usb: typec: tipd: fix event checking for tps6598x (git-fixes).
- usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes).
- VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes).
- VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() (stable-fixes).
- vmci: prevent speculation leaks by sanitizing event in event_deliver() (git-fixes).
- watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git-fixes).
- watchdog: ixp4xx: Make sure restart always works (git-fixes).
- watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin (git-fixes).
- wifi: ar5523: enable proper endpoint verification (git-fixes).
- wifi: ath10k: Fix an error code problem in ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes).
- wifi: ath10k: poll service ready message before failing (git-fixes).
- wifi: ath10k: populate board data for WCN3990 (git-fixes).
- wifi: ath11k: do not force enable power save on non-running vdevs (git-fixes).
- wifi: carl9170: add a proper sanity check for endpoints (git-fixes).
- wifi: carl9170: re-fix fortified-memset warning (git-fixes).
- wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes).
- wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes).
- wifi: mwl8k: initialize cmd->addr[] properly (git-fixes).
- x86/boot: Ignore NMIs during very early boot (git-fixes).
- x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).
- x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file (git-fixes).
- x86/bugs: Fix BHI documentation (git-fixes).
- x86/bugs: Fix BHI handling of RRSBA (git-fixes).
- x86/bugs: Fix BHI retpoline check (git-fixes).
- x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).
- x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-fixes).
- x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' (git-fixes).
- x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).
- x86: Fix CPUIDLE_FLAG_IRQ_ENABLE leaking timer reprogram (git-fixes).
- x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes).
- x86/lib: Fix overflow when counting digits (git-fixes).
- x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes).
- x86/nmi: Drop unused declaration of proc_nmi_enabled() (git-fixes).
- x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO (git-fixes).
- x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git-fixes).
- x86/sme: Fix memory encryption setting if enabled by default and not overridden (git-fixes).
- x86/tdx: Preserve shared bit on mprotect() (git-fixes).
- xfs: add missing cmap->br_state = XFS_EXT_NORM update (git-fixes).
- xfs: fix exception caused by unexpected illegal bestcount in leaf dir (git-fixes).
- xfs: Fix false ENOSPC when performing direct write on a delalloc extent in cow fork (git-fixes).
- xfs: fix imprecise logic in xchk_btree_check_block_owner (git-fixes).
- xfs: fix inode reservation space for removing transaction (git-fixes).
- xfs: shrink failure needs to hold AGI buffer (git-fixes).
Patchnames
SUSE-2024-2008,SUSE-SLE-Micro-5.5-2024-2008,SUSE-SLE-Module-Live-Patching-15-SP5-2024-2008,SUSE-SLE-Module-RT-15-SP5-2024-2008,openSUSE-SLE-15.5-2024-2008
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)\n- CVE-2022-48689: Fixed data-race in lru_add_fn (bsc#1223959)\n- CVE-2022-48691: Fixed memory leak in netfilter (bsc#1223961)\n- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).\n- CVE-2023-42755: Check user supplied offsets (bsc#1215702).\n- CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).\n- CVE-2023-52618: Fixed string overflow in block/rnbd-srv (bsc#1221615).\n- CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187).\n- CVE-2023-52660: Fiedx IRQ handling due to shared interrupts (bsc#1224443).\n- CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).\n- CVE-2023-52671: Fixed hang/underflow when transitioning to ODM4:1 (bsc#1224729).\n- CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put() (bsc#1224727).\n- CVE-2023-52680: Fixed missing error checks to *_ctl_get() (bsc#1224608).\n- CVE-2023-52692: Fixed missing error check to scarlett2_usb_set_config() (bsc#1224628).\n- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (CVE-2023-52698 bsc#1224621)\n- CVE-2023-52746: Prevent potential spectre v1 gadget in xfrm_xlate32_attr() (bsc#1225114)\n- CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548).\n- CVE-2023-52795: Fixed use after free in vhost_vdpa_probe() (bsc#1225085).\n- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).\n- CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce info is read via debugfs (bsc#1225097).\n- CVE-2023-52860: Fixed null pointer dereference in hisi_hns3 (bsc#1224936).\n- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).\n- CVE-2024-26643: Fixed mark set as dead when unbinding anonymous set with timeout (bsc#1221829).\n- CVE-2024-26679: Fixed read sk->sk_family once in inet_recv_error() (bsc#1222385).\n- CVE-2024-26692: Fixed regression in writes when non-standard maximum write size negotiated (bsc#1222464).\n- CVE-2024-26715: Fixed NULL pointer dereference in dwc3_gadget_suspend (bsc#1222561).\n- CVE-2024-26742: Fixed disable_managed_interrupts (git-fixes bsc#1222608).\n- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).\n- CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)\n- CVE-2024-26822: Set correct id, uid and cruid for multiuser automounts (bsc#1223011).\n- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).\n- CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).\n- CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).\n- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)\n- CVE-2024-26919: Fixed debugfs directory leak (bsc#1223847).\n- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).\n- CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390).\n- CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532).\n- CVE-2024-26939: Fixed UAF on destroy against retire race (bsc#1223679).\n- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).\n- CVE-2024-27042: Fixed potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' (bsc#1223823).\n- CVE-2024-27395: Fixed Use-After-Free in ovs_ct_exit (bsc#1224098).\n- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).\n- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).\n- CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181).\n- CVE-2024-27417: Fixed potential 'struct net' leak in inet6_rtm_getaddr() (bsc#1224721)\n- CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759)\n- CVE-2024-27431: Fixed Zero-initialise xdp_rxq_info struct before running XDP program (bsc#1224718).\n- CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725).\n- CVE-2024-35799: Prevent crash when disable stream (bsc#1224740).\n- CVE-2024-35804: Mark target gfn of emulated atomic instruction as dirty (bsc#1224638).\n- CVE-2024-35852: Fixed memory leak when canceling rehash work (bsc#1224502).\n- CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636).\n- CVE-2024-35860: struct bpf_link and bpf_link_ops kABI workaround (bsc#1224531).\n- CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766).\n- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).\n- CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763).\n- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765).\n- CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break() (bsc#1224668).\n- CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key() (bsc#1224667).\n- CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664).\n- CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678).\n- CVE-2024-35869: Guarantee refcounted children from parent session (bsc#1224679).\n- CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224672).\n- CVE-2024-35872: Fixed GUP-fast succeeding on secretmem folios (bsc#1224530).\n- CVE-2024-35875: Require seeding RNG with RDRAND on CoCo systems (bsc#1224665).\n- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).\n- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671).\n- CVE-2024-35879: kABI workaround for drivers/of/dynamic.c (bsc#1224524).\n- CVE-2024-35885: Stop interface during shutdown (bsc#1224519).\n- CVE-2024-35904: Fixed dereference of garbage after mount failure (bsc#1224494).\n- CVE-2024-35905: Fixed int overflow for stack access size (bsc#1224488).\n- CVE-2024-35907: Call request_irq() after NAPI initialized (bsc#1224492).\n- CVE-2024-35924: Limit read size on v1.2 (bsc#1224657).\n- CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure (bsc#1224535).\n- CVE-2024-35943: Fixed a null pointer dereference in omap_prm_domain_init (bsc#1224649).\n- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648).\n- CVE-2024-35951: Fixed the error path in panfrost_mmu_map_fault_addr() (bsc#1224701).\n- CVE-2024-35959: Fixed mlx5e_priv_init() cleanup flow (bsc#1224666).\n- CVE-2024-35964: Fixed not validating setsockopt user input (bsc#1224581).\n- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580).\n- CVE-2024-35973: Fixed header validation in geneve[6]_xmit_skb (bsc#1224586).\n- CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (bsc#1224575).\n- CVE-2024-35998: Fixed lock ordering potential deadlock in cifs_sync_mid_result (bsc#1224549).\n- CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550).\n- CVE-2024-36006: Fixed incorrect list API usage (bsc#1224541).\n- CVE-2024-36007: Fixed warning during rehash (bsc#1224543).\n- CVE-2024-36938: Fixed NULL pointer dereference in sk_psock_skb_ingress_enqueue (bsc#1225761).\n\nThe following non-security bugs were fixed:\n\n- 9p: explicitly deny setlease attempts (git-fixes).\n- ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes).\n- ACPI: disable -Wstringop-truncation (git-fixes).\n- ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes).\n- ACPI: LPSS: Advertise number of chip selects via property (git-fixes).\n- admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET (git-fixes).\n- af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384).\n- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).\n- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).\n- ALSA: core: Fix NULL module pointer assignment at card init (git-fixes).\n- ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes).\n- ALSA: line6: Zero-initialize message buffers (stable-fixes).\n- ARM: 9381/1: kasan: clear stale stack poison (git-fixes).\n- ASoC: Intel: avs: Fix ASRC module initialization (git-fixes).\n- ASoC: Intel: avs: Fix potential integer overflow (git-fixes).\n- ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes).\n- ASoC: Intel: Disable route checks for Skylake boards (git-fixes).\n- ASoC: kirkwood: Fix potential NULL dereference (git-fixes).\n- ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes).\n- ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes).\n- ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes).\n- ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes).\n- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).\n- ata: pata_legacy: make legacy_exit() work again (git-fixes).\n- ata: sata_gemini: Check clk_enable() result (stable-fixes).\n- autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166).\n- Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes).\n- Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor() (git-fixes).\n- Bluetooth: hci_sync: Do not double print name in add/remove adv_monitor (bsc#1216358).\n- Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes).\n- Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes).\n- Bluetooth: qca: add missing firmware sanity checks (git-fixes).\n- Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes).\n- Bluetooth: qca: fix firmware check error path (git-fixes).\n- Bluetooth: qca: fix info leak when fetching fw build id (git-fixes).\n- Bluetooth: qca: fix NVM configuration parsing (git-fixes).\n- bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git-fixes)\n- bpf: decouple prune and jump points (bsc#1225756).\n- bpf: fix precision backtracking instruction iteration (bsc#1225756).\n- bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes).\n- bpf: handle ldimm64 properly in check_cfg() (bsc#1225756).\n- bpf: mostly decouple jump history management from is_state_visited() (bsc#1225756).\n- bpf: remove unnecessary prune and jump points (bsc#1225756).\n- btrfs: add error messages to all unrecognized mount options (git-fixes)\n- btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes)\n- btrfs: export: handle invalid inode or root reference in btrfs_get_parent() (git-fixes)\n- btrfs: extend locking to all space_info members accesses (git-fixes)\n- btrfs: fix btrfs_submit_compressed_write cgroup attribution (git-fixes)\n- btrfs: fix fallocate to use file_modified to update permissions consistently (git-fixes)\n- btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes)\n- btrfs: fix missing blkdev_put() call in btrfs_scan_one_device() (git-fixes)\n- btrfs: fix off-by-one chunk length calculation at contains_pending_extent() (git-fixes)\n- btrfs: fix qgroup reserve overflow the qgroup limit (git-fixes)\n- btrfs: fix silent failure when deleting root reference (git-fixes)\n- btrfs: fix use-after-free after failure to create a snapshot (git-fixes)\n- btrfs: free exchange changeset on failures (git-fixes)\n- btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git-fixes)\n- btrfs: make search_csum_tree return 0 if we get -EFBIG (git-fixes)\n- btrfs: prevent copying too big compressed lzo segment (git-fixes)\n- btrfs: remove BUG_ON(!eie) in find_parent_nodes (git-fixes)\n- btrfs: remove BUG_ON() in find_parent_nodes() (git-fixes)\n- btrfs: repair super block num_devices automatically (git-fixes)\n- btrfs: replace the BUG_ON in btrfs_del_root_ref with proper error handling (git-fixes)\n- btrfs: send: ensure send_fd is writable (git-fixes)\n- btrfs: send: handle path ref underflow in header iterate_inode_ref() (git-fixes)\n- btrfs: send: in case of IO error log it (git-fixes)\n- btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes)\n- btrfs: tree-checker: check item_size for dev_item (git-fixes)\n- btrfs: tree-checker: check item_size for inode_item (git-fixes)\n- cifs: account for primary channel in the interface list (bsc#1224020).\n- cifs: cifs_chan_is_iface_active should be called with chan_lock held (bsc#1224020).\n- cifs: distribute channels across interfaces based on speed (bsc#1224020).\n- cifs: do not pass cifs_sb when trying to add channels (bsc#1224020).\n- cifs: failure to add channel on iface should bump up weight (git-fixes, bsc#1224020).\n- cifs: fix charset issue in reconnection (bsc#1224020).\n- cifs: fix leak of iface for primary channel (git-fixes, bsc#1224020).\n- cifs: handle cases where a channel is closed (bsc#1224020).\n- cifs: handle cases where multiple sessions share connection (bsc#1224020).\n- cifs: reconnect work should have reference on server struct (bsc#1224020).\n- clk: Do not hold prepare_lock when calling kref_put() (stable-fixes).\n- clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes).\n- counter: stm32-lptimer-cnt: Provide defines for clock polarities (git-fixes).\n- counter: stm32-timer-cnt: Provide defines for slave mode selection (git-fixes).\n- cppc_cpufreq: Fix possible null pointer dereference (git-fixes).\n- cpu/hotplug: Remove the 'cpu' member of cpuhp_cpu_state (git-fixes).\n- cpumask: Add for_each_cpu_from() (bsc#1225053).\n- crypto: bcm - Fix pointer arithmetic (git-fixes).\n- crypto: ccp - drop platform ifdef checks (git-fixes).\n- crypto: ecdsa - Fix module auto-load on add-key (git-fixes).\n- crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes).\n- crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes).\n- crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes).\n- dmaengine: axi-dmac: fix possible race in remove() (git-fixes).\n- dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes).\n- dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11 users (git-fixes).\n- dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575).\n- docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes).\n- drivers/nvme: Add quirks for device 126f:2262 (git-fixes).\n- drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes).\n- drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes).\n- drm/amd/display: Fix potential index out of bounds in color transformation function (git-fixes).\n- drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes).\n- drm/amd: Flush GFXOFF requests in prepare stage (git-fixes).\n- drm/amdgpu: Refine IB schedule error logging (stable-fixes).\n- drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git-fixes).\n- drm/arm/malidp: fix a possible null pointer dereference (git-fixes).\n- drm/bridge: anx7625: Do not log an error when DSI host can't be found (git-fixes).\n- drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git-fixes).\n- drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git-fixes).\n- drm/bridge: icn6211: Do not log an error when DSI host can't be found (git-fixes).\n- drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git-fixes).\n- drm/bridge: lt9611: Do not log an error when DSI host can't be found (git-fixes).\n- drm/bridge: tc358775: Do not log an error when DSI host can't be found (git-fixes).\n- drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes).\n- drm/connector: Add \\n to message about demoting connector force-probes (git-fixes).\n- drm/i915/bios: Fix parsing backlight BDB data (git-fixes).\n- drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes).\n- drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes).\n- drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes).\n- drm/meson: dw-hdmi: power up phy on device init (git-fixes).\n- drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes).\n- drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes).\n- drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes).\n- drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk (git-fixes).\n- drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes).\n- drm/panel: atna33xc20: Fix unbalanced regulator in the case HPD does not assert (git-fixes).\n- drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found (git-fixes).\n- drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector (git-fixes).\n- drm: vc4: Fix possible null pointer dereference (git-fixes).\n- dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes)\n- dyndbg: fix old BUG_ON in >control parser (stable-fixes).\n- efi: libstub: only free priv.runtime_map when allocated (git-fixes).\n- extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes).\n- fail_function: fix wrong use of fei_attr_remove().\n- fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes).\n- fbdev: shmobile: fix snprintf truncation (git-fixes).\n- fbdev: sisfb: hide unused variables (git-fixes).\n- firewire: ohci: mask bus reset interrupts between ISR and bottom half (stable-fixes).\n- firmware: dmi-id: add a release callback function (git-fixes).\n- firmware: raspberrypi: Use correct device for DMA mappings (git-fixes).\n- fs/9p: drop inodes immediately on non-.L too (git-fixes).\n- fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes).\n- fs/9p: translate O_TRUNC into OTRUNC (git-fixes).\n- gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes).\n- gpio: wcove: Use -ENOTSUPP consistently (stable-fixes).\n- gpu: host1x: Do not setup DMA for virtual devices (stable-fixes).\n- HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes).\n- hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git-fixes).\n- hwmon: (corsair-cpro) Use a separate buffer for sending commands (git-fixes).\n- hwmon: (corsair-cpro) Use complete_all() instead of complete() in ccp_raw_event() (git-fixes).\n- hwmon: (lm70) fix links in doc and comments (git-fixes).\n- hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes).\n- i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame (git-fixes).\n- i3c: master: svc: fix invalidate IBI type and miss call client IBI handler (git-fixes).\n- IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes)\n- idpf: extend tx watchdog timeout (bsc#1224137).\n- iio: core: Leave private pointer NULL when no private data supplied (git-fixes).\n- iio: pressure: dps310: support negative temperature values (git-fixes).\n- Input: cyapa - add missing input core locking to suspend/resume functions (git-fixes).\n- Input: ims-pcu - fix printf string overflow (git-fixes).\n- Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes).\n- iomap: Fix inline extent handling in iomap_readpage (git-fixes)\n- iomap: iomap: fix memory corruption when recording errors during writeback (git-fixes)\n- iomap: Support partial direct I/O on user copy failures (git-fixes)\n- iommu/dma: Force swiotlb_max_mapping_size on an untrusted device (bsc#1224331)\n- io_uring/unix: drop usage of io_uring socket (git-fixes).\n- irqchip/gic-v3-its: Prevent double free on error (git-fixes).\n- jffs2: prevent xattr node from overflowing the eraseblock (git-fixes).\n- kABI: bpf: struct bpf_insn_aux_data kABI workaround (bsc#1225756).\n- kcm: do not sense pfmemalloc status in kcm_sendpage() (git-fixes bsc#1223959)\n- KEYS: trusted: Do not use WARN when encode fails (git-fixes).\n- KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes).\n- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1224794).\n- KVM: x86: Delete duplicate documentation for KVM_X86_SET_MSR_FILTER (git-fixes).\n- leds: pwm: Disable PWM when going to suspend (git-fixes).\n- libsubcmd: Fix parse-options memory leak (git-fixes).\n- locking/atomic: Make test_and_*_bit() ordered on failure (git-fixes).\n- media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries (git-fixes).\n- media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes).\n- media: mc: mark the media devnode as registered from the, start (git-fixes).\n- media: ngene: Add dvb_ca_en50221_init return value check (git-fixes).\n- media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes).\n- mei: me: add lunar lake point M DID (stable-fixes).\n- mfd: intel-lpss: Revert 'Add missing check for platform_get_resource' (git-fixes).\n- mfd: ti_am335x_tscadc: Support the correctly spelled DT property (git-fixes).\n- mfd: tqmx86: Specify IO port register range more precisely (git-fixes).\n- mlxbf_gige: Enable the GigE port in mlxbf_gige_open (git-fixes).\n- mlxbf_gige: Fix intermittent no ip issue (git-fixes).\n- mlxbf_gige: stop PHY during open() error paths (git-fixes).\n- mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes).\n- mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes).\n- mtd: core: Report error if first mtd_otp_size() call fails in mtd_otp_nvmem_add() (git-fixes).\n- mtd: rawnand: hynix: fixed typo (git-fixes).\n- net: do not sense pfmemalloc status in skb_append_pagefrags() (git-fixes bsc#1223959)\n- netfilter: nf_tables: bail out early if hardware offload is not supported (git-fixes bsc#1223961)\n- net: introduce __skb_fill_page_desc_noacc (git-fixes bsc#1223959)\n- net: nfc: remove inappropriate attrs check (stable-fixes).\n- net: qualcomm: rmnet: fix global oob in rmnet_policy (git-fixes).\n- net: usb: ax88179_178a: fix link status when link is set to down/up (git-fixes).\n- net:usb:qmi_wwan: support Rolling modules (stable-fixes).\n- net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).\n- net: usb: sr9700: stop lying about skb->truesize (git-fixes).\n- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).\n- nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git-fixes).\n- nfc: nci: Fix uninit-value in nci_rx_work (git-fixes).\n- nilfs2: fix out-of-range warning (git-fixes).\n- nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes).\n- nilfs2: fix use-after-free of timer for log writer thread (git-fixes).\n- nilfs2: make superblock data array index computation sparse friendly (git-fixes).\n- nvme: ensure disabling pairs with unquiesce (bsc#1224534).\n- nvme: fix miss command type check (git-fixes).\n- nvme: fix multipath batched completion accounting (git-fixes).\n- nvme-multipath: fix io accounting on failover (git-fixes).\n- nvmet: fix ns enable/disable possible hang (git-fixes).\n- PCI: dwc: Detect iATU settings after getting 'addr_space' resource (git-fixes).\n- PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host (git-fixes).\n- PCI: dwc: Use the bitmap API to allocate bitmaps (git-fixes).\n- PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes).\n- PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes).\n- PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes).\n- PCI: tegra194: Fix probe path for Endpoint mode (git-fixes).\n- pinctrl: armada-37xx: remove an unused variable (git-fixes).\n- pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes).\n- pinctrl: core: handle radix_tree_insert() errors in pinctrl_register_one_pin() (stable-fixes).\n- pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes).\n- pinctrl/meson: fix typo in PDM's pin name (git-fixes).\n- pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git-fixes).\n- platform/x86/intel-uncore-freq: Do not present root domain on error (git-fixes).\n- platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git-fixes).\n- powerpc/eeh: Permanently disable the removed device (bsc#1223991 ltc#205740).\n- powerpc/eeh: Small refactor of eeh_handle_normal_event() (bsc#1223991 ltc#205740).\n- powerpc/eeh: Use a goto for recovery failures (bsc#1223991 ltc#205740).\n- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).\n- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).\n- powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783).\n- powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869).\n- powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869).\n- power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes).\n- ppdev: Add an error check in register_device (git-fixes).\n- printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1225616).\n- qibfs: fix dentry leak (git-fixes)\n- RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git-fixes)\n- RDMA/hns: Fix deadlock on SRQ async events. (git-fixes)\n- RDMA/hns: Fix GMV table pagesize (git-fixes)\n- RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes)\n- RDMA/hns: Fix UAF for cq async event (git-fixes)\n- RDMA/hns: Modify the print level of CQE error (git-fixes)\n- RDMA/hns: Use complete parentheses in macros (git-fixes)\n- RDMA/IPoIB: Fix format truncation compilation errors (git-fixes)\n- RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes)\n- RDMA/mlx5: Fix port number for counter query in multi-port configuration (git-fixes)\n- RDMA/rxe: Add ibdev_dbg macros for rxe (git-fixes)\n- RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes)\n- RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes)\n- RDMA/rxe: Fix the problem 'mutex_destroy missing' (git-fixes)\n- RDMA/rxe: Replace pr_xxx by rxe_dbg_xxx in rxe_net.c (git-fixes)\n- RDMA/rxe: Split rxe_run_task() into two subroutines (git-fixes)\n- regulator: bd71828: Do not overwrite runtime voltages (git-fixes).\n- regulator: core: fix debugfs creation regression (git-fixes).\n- regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes).\n- remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes).\n- Rename colliding patches before origin/cve/linux-5.14-LTSS -> SLE15-SP5 merge\n- Revert 'cifs: reconnect work should have reference on server struct' (git-fixes, bsc#1224020).\n- Revert 'drm/bridge: ti-sn65dsi83: Fix enable error path' (git-fixes).\n- ring-buffer: Fix a race between readers and resize checks (git-fixes).\n- s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224795).\n- s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224796).\n- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224346).\n- s390/ipl: Fix incorrect initialization of len fields in nvme reipl block (git-fixes bsc#1225139).\n- s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes bsc#1225138).\n- sched/topology: Optimize topology_span_sane() (bsc#1225053).\n- scsi: arcmsr: Support new PCI device IDs 1883 and 1886 (git-fixes).\n- scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes).\n- scsi: core: Consult supported VPD page list prior to fetching page (git-fixes).\n- scsi: core: Fix unremoved procfs host directory regression (git-fixes).\n- scsi: csiostor: Avoid function pointer casts (git-fixes).\n- scsi: libfc: Do not schedule abort twice (git-fixes).\n- scsi: libfc: Fix up timeout error in fc_fcp_rec_error() (git-fixes).\n- scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842).\n- scsi: lpfc: Change default logging level for unsolicited CT MIB commands (bsc#1225842).\n- scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842).\n- scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading (bsc#1225842).\n- scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842).\n- scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list (bsc#1225842).\n- scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842).\n- scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842).\n- scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git-fixes).\n- scsi: mylex: Fix sysfs buffer lengths (git-fixes).\n- scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes).\n- scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git-fixes).\n- selftests/pidfd: Fix config for pidfd_setns_test (git-fixes).\n- serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes).\n- serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable-fixes).\n- serial: max3100: Fix bitwise types (git-fixes).\n- serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git-fixes).\n- serial: max3100: Update uart_driver_registered on driver removal (git-fixes).\n- serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git-fixes).\n- serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler (git-fixes).\n- serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes).\n- smb3: show beginning time for per share stats (bsc#1224020).\n- smb: client: ensure to try all targets when finding nested links (bsc#1224020).\n- smb: client: fix mount when dns_resolver key is not available (git-fixes, bsc#1224020).\n- smb: client: get rid of dfs code dep in namespace.c (bsc#1224020).\n- smb: client: get rid of dfs naming in automount code (bsc#1224020).\n- smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1224020).\n- smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1224020).\n- smb: client: remove extra @chan_count check in __cifs_put_smb_ses() (bsc#1224020).\n- smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1224020).\n- soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes).\n- soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes).\n- Sort recent BHI patches\n- speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes).\n- spmi: Add a check for remove callback when removing a SPMI driver (git-fixes).\n- spmi: hisi-spmi-controller: Do not override device identifier (git-fixes).\n- swiotlb: extend buffer pre-padding to alloc_align_mask if necessary (bsc#1224331). \n- swiotlb: Fix alignment checks when both allocation and DMA masks are (bsc#1224331)\n- swiotlb: Fix double-allocation of slots due to broken alignment (bsc#1224331)\n- swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() (bsc#1224331)\n- sysv: do not call sb_bread() with pointers_lock held (git-fixes).\n- thermal/drivers/tsens: Fix null pointer dereference (git-fixes).\n- tools/latency-collector: Fix -Wformat-security compile warns (git-fixes).\n- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer (bsc#1225535)\n- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (git-fixes).\n- tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes).\n- tracing: hide unused ftrace_event_id_fops (git-fixes).\n- tty: n_gsm: fix missing receive state reset after mode switch (git-fixes).\n- tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes).\n- Update patches.suse/ring-buffer-Fix-a-race-between-readers-and-resize-checks.patch (bsc#1222893).\n- Update patches.suse/scsi-qedf-Don-t-process-stag-work-during-unload.patch (bsc#1214852)\n- Update patches.suse/scsi-qedf-Wait-for-stag-work-during-unload.patch (bsc#1214852)\n- usb: aqc111: stop lying about skb->truesize (git-fixes).\n- USB: core: Add hub_get() and hub_put() routines (git-fixes).\n- USB: core: Fix access violation during port device removal (git-fixes).\n- USB: core: Fix deadlock in port 'disable' sysfs attribute (git-fixes).\n- usb: dwc3: core: Prevent phy suspend during init (Git-fixes).\n- usb: gadget: u_audio: Clear uac pointer when freed (git-fixes).\n- usb: typec: tipd: fix event checking for tps6598x (git-fixes).\n- usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes).\n- VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes).\n- VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() (stable-fixes).\n- vmci: prevent speculation leaks by sanitizing event in event_deliver() (git-fixes).\n- watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git-fixes).\n- watchdog: ixp4xx: Make sure restart always works (git-fixes).\n- watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin (git-fixes).\n- wifi: ar5523: enable proper endpoint verification (git-fixes).\n- wifi: ath10k: Fix an error code problem in ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes).\n- wifi: ath10k: poll service ready message before failing (git-fixes).\n- wifi: ath10k: populate board data for WCN3990 (git-fixes).\n- wifi: ath11k: do not force enable power save on non-running vdevs (git-fixes).\n- wifi: carl9170: add a proper sanity check for endpoints (git-fixes).\n- wifi: carl9170: re-fix fortified-memset warning (git-fixes).\n- wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes).\n- wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes).\n- wifi: mwl8k: initialize cmd->addr[] properly (git-fixes).\n- x86/boot: Ignore NMIs during very early boot (git-fixes).\n- x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).\n- x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file (git-fixes).\n- x86/bugs: Fix BHI documentation (git-fixes).\n- x86/bugs: Fix BHI handling of RRSBA (git-fixes).\n- x86/bugs: Fix BHI retpoline check (git-fixes).\n- x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).\n- x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-fixes).\n- x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' (git-fixes).\n- x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).\n- x86: Fix CPUIDLE_FLAG_IRQ_ENABLE leaking timer reprogram (git-fixes).\n- x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes).\n- x86/lib: Fix overflow when counting digits (git-fixes).\n- x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes).\n- x86/nmi: Drop unused declaration of proc_nmi_enabled() (git-fixes).\n- x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO (git-fixes).\n- x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git-fixes).\n- x86/sme: Fix memory encryption setting if enabled by default and not overridden (git-fixes).\n- x86/tdx: Preserve shared bit on mprotect() (git-fixes).\n- xfs: add missing cmap->br_state = XFS_EXT_NORM update (git-fixes).\n- xfs: fix exception caused by unexpected illegal bestcount in leaf dir (git-fixes).\n- xfs: Fix false ENOSPC when performing direct write on a delalloc extent in cow fork (git-fixes).\n- xfs: fix imprecise logic in xchk_btree_check_block_owner (git-fixes).\n- xfs: fix inode reservation space for removing transaction (git-fixes).\n- xfs: shrink failure needs to hold AGI buffer (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2024-2008,SUSE-SLE-Micro-5.5-2024-2008,SUSE-SLE-Module-Live-Patching-15-SP5-2024-2008,SUSE-SLE-Module-RT-15-SP5-2024-2008,openSUSE-SLE-15.5-2024-2008", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2008-1.json", }, { category: "self", summary: "URL for SUSE-SU-2024:2008-1", url: "https://www.suse.com/support/update/announcement/2024/suse-su-20242008-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2024:2008-1", url: "https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1141539", url: "https://bugzilla.suse.com/1141539", }, { category: "self", summary: "SUSE Bug 1174585", url: "https://bugzilla.suse.com/1174585", }, { category: "self", summary: "SUSE Bug 1181674", url: "https://bugzilla.suse.com/1181674", }, { category: "self", summary: "SUSE Bug 1187716", url: "https://bugzilla.suse.com/1187716", }, { category: "self", summary: "SUSE Bug 1190569", url: "https://bugzilla.suse.com/1190569", }, { category: "self", summary: "SUSE Bug 1191949", url: "https://bugzilla.suse.com/1191949", }, { category: "self", summary: "SUSE Bug 1192107", url: "https://bugzilla.suse.com/1192107", }, { category: "self", summary: "SUSE Bug 1193983", url: "https://bugzilla.suse.com/1193983", }, { category: "self", summary: "SUSE Bug 1194288", url: "https://bugzilla.suse.com/1194288", }, { category: "self", summary: "SUSE Bug 1194869", url: "https://bugzilla.suse.com/1194869", }, { category: "self", summary: "SUSE Bug 1196956", url: "https://bugzilla.suse.com/1196956", }, { category: "self", summary: "SUSE Bug 1197915", url: "https://bugzilla.suse.com/1197915", }, { category: "self", summary: "SUSE Bug 1200465", url: "https://bugzilla.suse.com/1200465", }, { category: "self", summary: "SUSE Bug 1205205", url: "https://bugzilla.suse.com/1205205", }, { category: "self", summary: "SUSE Bug 1207284", url: "https://bugzilla.suse.com/1207284", }, { category: "self", summary: "SUSE Bug 1207361", url: "https://bugzilla.suse.com/1207361", }, { category: "self", summary: "SUSE Bug 1207948", url: "https://bugzilla.suse.com/1207948", }, { category: "self", summary: "SUSE Bug 1208149", url: "https://bugzilla.suse.com/1208149", }, { category: "self", summary: "SUSE Bug 1209657", url: "https://bugzilla.suse.com/1209657", }, { category: "self", summary: "SUSE Bug 1209799", url: "https://bugzilla.suse.com/1209799", }, { category: "self", summary: "SUSE Bug 1209834", url: "https://bugzilla.suse.com/1209834", }, { category: "self", summary: "SUSE Bug 1209980", url: "https://bugzilla.suse.com/1209980", }, { category: "self", summary: "SUSE Bug 1210335", url: "https://bugzilla.suse.com/1210335", }, { category: "self", summary: "SUSE Bug 1213863", url: "https://bugzilla.suse.com/1213863", }, { category: "self", summary: "SUSE Bug 1214852", url: "https://bugzilla.suse.com/1214852", }, { category: "self", summary: "SUSE Bug 1215322", url: "https://bugzilla.suse.com/1215322", }, { category: "self", summary: "SUSE Bug 1215702", url: "https://bugzilla.suse.com/1215702", }, { category: "self", summary: "SUSE Bug 1216358", url: "https://bugzilla.suse.com/1216358", }, { category: "self", summary: "SUSE Bug 1216702", url: "https://bugzilla.suse.com/1216702", }, { category: "self", summary: "SUSE Bug 1217169", url: "https://bugzilla.suse.com/1217169", }, { category: "self", summary: "SUSE Bug 1217339", url: "https://bugzilla.suse.com/1217339", }, { category: "self", summary: "SUSE Bug 1217515", url: "https://bugzilla.suse.com/1217515", }, { category: "self", summary: "SUSE Bug 1218447", url: "https://bugzilla.suse.com/1218447", }, { category: "self", summary: "SUSE Bug 1220021", url: "https://bugzilla.suse.com/1220021", }, { category: "self", summary: "SUSE Bug 1220267", url: "https://bugzilla.suse.com/1220267", }, { category: "self", summary: "SUSE Bug 1220363", url: "https://bugzilla.suse.com/1220363", }, { category: "self", summary: "SUSE Bug 1220783", url: "https://bugzilla.suse.com/1220783", }, { category: "self", summary: "SUSE Bug 1221044", url: "https://bugzilla.suse.com/1221044", }, { category: "self", summary: "SUSE Bug 1221081", url: "https://bugzilla.suse.com/1221081", }, { category: "self", summary: "SUSE Bug 1221615", url: "https://bugzilla.suse.com/1221615", }, { category: "self", summary: "SUSE Bug 1221777", url: "https://bugzilla.suse.com/1221777", }, { category: "self", summary: "SUSE Bug 1221816", url: "https://bugzilla.suse.com/1221816", }, { category: "self", summary: "SUSE Bug 1221829", url: "https://bugzilla.suse.com/1221829", }, { category: "self", summary: "SUSE Bug 1222011", url: "https://bugzilla.suse.com/1222011", }, { category: "self", summary: "SUSE Bug 1222374", url: "https://bugzilla.suse.com/1222374", }, { category: "self", summary: "SUSE Bug 1222385", url: "https://bugzilla.suse.com/1222385", }, { category: "self", summary: "SUSE Bug 1222413", url: "https://bugzilla.suse.com/1222413", }, { category: "self", summary: "SUSE Bug 1222464", url: "https://bugzilla.suse.com/1222464", }, { category: "self", summary: "SUSE Bug 1222513", url: "https://bugzilla.suse.com/1222513", }, { category: "self", summary: "SUSE Bug 1222559", url: "https://bugzilla.suse.com/1222559", }, { category: "self", summary: "SUSE Bug 1222561", url: "https://bugzilla.suse.com/1222561", }, { category: "self", summary: "SUSE Bug 1222608", url: "https://bugzilla.suse.com/1222608", }, { category: "self", summary: "SUSE Bug 1222619", url: "https://bugzilla.suse.com/1222619", }, { category: "self", summary: "SUSE Bug 1222627", url: "https://bugzilla.suse.com/1222627", }, { category: "self", summary: "SUSE Bug 1222721", url: "https://bugzilla.suse.com/1222721", }, { category: "self", summary: "SUSE Bug 1222765", url: "https://bugzilla.suse.com/1222765", }, { category: "self", summary: "SUSE Bug 1222770", url: "https://bugzilla.suse.com/1222770", }, { category: "self", summary: "SUSE Bug 1222783", url: "https://bugzilla.suse.com/1222783", }, { category: "self", summary: "SUSE Bug 1222793", url: "https://bugzilla.suse.com/1222793", }, { category: "self", summary: "SUSE Bug 1222838", url: "https://bugzilla.suse.com/1222838", }, { category: "self", summary: "SUSE Bug 1222870", url: "https://bugzilla.suse.com/1222870", }, { category: "self", summary: "SUSE Bug 1222893", url: "https://bugzilla.suse.com/1222893", }, { category: "self", summary: "SUSE Bug 1222960", url: "https://bugzilla.suse.com/1222960", }, { category: "self", summary: "SUSE Bug 1222961", url: "https://bugzilla.suse.com/1222961", }, { category: "self", summary: "SUSE Bug 1222974", url: "https://bugzilla.suse.com/1222974", }, { category: "self", summary: "SUSE Bug 1222975", url: "https://bugzilla.suse.com/1222975", }, { category: "self", summary: "SUSE Bug 1222976", url: "https://bugzilla.suse.com/1222976", }, { category: "self", summary: "SUSE Bug 1223011", url: "https://bugzilla.suse.com/1223011", }, { category: "self", summary: "SUSE Bug 1223023", url: "https://bugzilla.suse.com/1223023", }, { category: "self", summary: "SUSE Bug 1223027", url: "https://bugzilla.suse.com/1223027", }, { category: "self", summary: "SUSE Bug 1223031", url: "https://bugzilla.suse.com/1223031", }, { category: "self", summary: "SUSE Bug 1223043", url: "https://bugzilla.suse.com/1223043", }, { category: "self", summary: "SUSE Bug 1223046", url: "https://bugzilla.suse.com/1223046", }, { category: "self", summary: "SUSE Bug 1223048", url: "https://bugzilla.suse.com/1223048", }, { category: "self", summary: "SUSE Bug 1223049", url: "https://bugzilla.suse.com/1223049", }, { category: "self", summary: "SUSE Bug 1223084", url: "https://bugzilla.suse.com/1223084", }, { category: "self", summary: "SUSE Bug 1223113", url: "https://bugzilla.suse.com/1223113", }, { category: "self", summary: "SUSE Bug 1223119", url: "https://bugzilla.suse.com/1223119", }, { category: "self", summary: "SUSE Bug 1223137", url: "https://bugzilla.suse.com/1223137", }, { category: "self", summary: "SUSE Bug 1223138", url: "https://bugzilla.suse.com/1223138", }, { category: "self", summary: "SUSE Bug 1223140", url: "https://bugzilla.suse.com/1223140", }, { category: "self", summary: "SUSE Bug 1223188", url: "https://bugzilla.suse.com/1223188", }, { category: "self", summary: "SUSE Bug 1223203", url: "https://bugzilla.suse.com/1223203", }, { category: "self", summary: "SUSE Bug 1223207", url: "https://bugzilla.suse.com/1223207", }, { category: "self", summary: "SUSE Bug 1223315", url: "https://bugzilla.suse.com/1223315", }, { category: "self", summary: "SUSE Bug 1223360", url: "https://bugzilla.suse.com/1223360", }, { category: "self", summary: "SUSE Bug 1223384", url: "https://bugzilla.suse.com/1223384", }, { category: "self", summary: "SUSE Bug 1223390", url: "https://bugzilla.suse.com/1223390", }, { category: "self", summary: "SUSE Bug 1223432", url: "https://bugzilla.suse.com/1223432", }, { category: "self", summary: "SUSE Bug 1223489", url: "https://bugzilla.suse.com/1223489", }, { category: "self", summary: "SUSE Bug 1223505", url: "https://bugzilla.suse.com/1223505", }, { category: "self", summary: "SUSE Bug 1223532", url: "https://bugzilla.suse.com/1223532", }, { category: "self", summary: "SUSE Bug 1223575", url: "https://bugzilla.suse.com/1223575", }, { category: "self", summary: "SUSE Bug 1223595", url: "https://bugzilla.suse.com/1223595", }, { category: "self", summary: "SUSE Bug 1223626", url: "https://bugzilla.suse.com/1223626", }, { category: "self", summary: "SUSE Bug 1223627", url: "https://bugzilla.suse.com/1223627", }, { category: "self", summary: "SUSE Bug 1223628", url: "https://bugzilla.suse.com/1223628", }, { category: "self", summary: "SUSE Bug 1223631", url: "https://bugzilla.suse.com/1223631", }, { category: "self", summary: "SUSE Bug 1223633", url: "https://bugzilla.suse.com/1223633", }, { category: "self", summary: "SUSE Bug 1223638", url: "https://bugzilla.suse.com/1223638", }, { category: "self", summary: "SUSE Bug 1223650", url: "https://bugzilla.suse.com/1223650", }, { category: "self", summary: "SUSE Bug 1223653", url: "https://bugzilla.suse.com/1223653", }, { category: "self", summary: "SUSE Bug 1223666", url: "https://bugzilla.suse.com/1223666", }, { category: "self", summary: "SUSE Bug 1223670", url: "https://bugzilla.suse.com/1223670", }, { category: "self", summary: "SUSE Bug 1223671", url: "https://bugzilla.suse.com/1223671", }, { category: "self", summary: "SUSE Bug 1223675", url: "https://bugzilla.suse.com/1223675", }, { category: "self", summary: "SUSE Bug 1223677", url: "https://bugzilla.suse.com/1223677", }, { category: "self", summary: "SUSE Bug 1223678", url: "https://bugzilla.suse.com/1223678", }, { category: "self", summary: "SUSE Bug 1223679", url: "https://bugzilla.suse.com/1223679", }, { category: "self", summary: "SUSE Bug 1223698", url: "https://bugzilla.suse.com/1223698", }, { category: "self", summary: "SUSE Bug 1223712", url: "https://bugzilla.suse.com/1223712", }, { category: "self", summary: "SUSE Bug 1223715", url: "https://bugzilla.suse.com/1223715", }, { category: "self", summary: "SUSE Bug 1223717", url: "https://bugzilla.suse.com/1223717", }, { category: "self", summary: "SUSE Bug 1223718", url: "https://bugzilla.suse.com/1223718", }, { category: "self", summary: "SUSE Bug 1223737", url: "https://bugzilla.suse.com/1223737", }, { category: "self", summary: "SUSE Bug 1223738", url: "https://bugzilla.suse.com/1223738", }, { category: "self", summary: "SUSE Bug 1223741", url: "https://bugzilla.suse.com/1223741", }, { category: "self", summary: "SUSE Bug 1223744", url: "https://bugzilla.suse.com/1223744", }, { category: "self", summary: "SUSE Bug 1223747", url: "https://bugzilla.suse.com/1223747", }, { category: "self", summary: "SUSE Bug 1223748", url: "https://bugzilla.suse.com/1223748", }, { category: "self", summary: "SUSE Bug 1223750", url: "https://bugzilla.suse.com/1223750", }, { category: "self", summary: "SUSE Bug 1223752", url: "https://bugzilla.suse.com/1223752", }, { category: "self", summary: "SUSE Bug 1223754", url: "https://bugzilla.suse.com/1223754", }, { category: "self", summary: "SUSE Bug 1223756", url: "https://bugzilla.suse.com/1223756", }, { category: "self", summary: "SUSE Bug 1223757", url: "https://bugzilla.suse.com/1223757", }, { category: "self", summary: "SUSE Bug 1223762", url: "https://bugzilla.suse.com/1223762", }, { category: "self", summary: "SUSE Bug 1223769", url: "https://bugzilla.suse.com/1223769", }, { category: "self", summary: "SUSE Bug 1223770", url: "https://bugzilla.suse.com/1223770", }, { category: "self", summary: "SUSE Bug 1223779", url: "https://bugzilla.suse.com/1223779", }, { category: "self", summary: "SUSE Bug 1223780", url: "https://bugzilla.suse.com/1223780", }, { category: "self", summary: "SUSE Bug 1223781", url: "https://bugzilla.suse.com/1223781", }, { category: "self", summary: "SUSE Bug 1223788", url: "https://bugzilla.suse.com/1223788", }, { category: "self", summary: "SUSE Bug 1223802", url: "https://bugzilla.suse.com/1223802", }, { category: "self", summary: "SUSE Bug 1223819", url: "https://bugzilla.suse.com/1223819", }, { category: "self", summary: "SUSE Bug 1223823", url: "https://bugzilla.suse.com/1223823", }, { category: "self", summary: "SUSE Bug 1223826", url: "https://bugzilla.suse.com/1223826", }, { category: "self", summary: "SUSE Bug 1223828", url: "https://bugzilla.suse.com/1223828", }, { category: "self", summary: "SUSE Bug 1223829", url: "https://bugzilla.suse.com/1223829", }, { category: "self", summary: "SUSE Bug 1223837", url: "https://bugzilla.suse.com/1223837", }, { category: "self", summary: "SUSE Bug 1223842", url: "https://bugzilla.suse.com/1223842", }, { category: "self", summary: "SUSE Bug 1223843", url: "https://bugzilla.suse.com/1223843", }, { category: "self", summary: "SUSE Bug 1223844", url: "https://bugzilla.suse.com/1223844", }, { category: "self", summary: "SUSE Bug 1223847", url: "https://bugzilla.suse.com/1223847", }, { category: "self", summary: "SUSE Bug 1223858", url: "https://bugzilla.suse.com/1223858", }, { category: "self", summary: "SUSE Bug 1223875", url: "https://bugzilla.suse.com/1223875", }, { category: "self", summary: "SUSE Bug 1223879", url: "https://bugzilla.suse.com/1223879", }, { category: "self", summary: "SUSE Bug 1223895", url: "https://bugzilla.suse.com/1223895", }, { category: "self", summary: "SUSE Bug 1223959", url: "https://bugzilla.suse.com/1223959", }, { category: "self", summary: "SUSE Bug 1223961", url: "https://bugzilla.suse.com/1223961", }, { category: "self", summary: "SUSE Bug 1223991", url: "https://bugzilla.suse.com/1223991", }, { category: "self", summary: "SUSE Bug 1223996", url: "https://bugzilla.suse.com/1223996", }, { category: "self", summary: "SUSE Bug 1224020", url: "https://bugzilla.suse.com/1224020", }, { category: "self", summary: "SUSE Bug 1224076", url: "https://bugzilla.suse.com/1224076", }, { category: "self", summary: "SUSE Bug 1224096", url: "https://bugzilla.suse.com/1224096", }, { category: "self", summary: "SUSE Bug 1224098", url: "https://bugzilla.suse.com/1224098", }, { category: "self", summary: "SUSE Bug 1224099", url: "https://bugzilla.suse.com/1224099", }, { category: "self", summary: "SUSE Bug 1224137", url: "https://bugzilla.suse.com/1224137", }, { category: "self", summary: "SUSE Bug 1224166", url: "https://bugzilla.suse.com/1224166", }, { category: "self", summary: "SUSE Bug 1224174", url: "https://bugzilla.suse.com/1224174", }, { category: "self", summary: "SUSE Bug 1224177", url: "https://bugzilla.suse.com/1224177", }, { category: "self", summary: "SUSE Bug 1224180", url: "https://bugzilla.suse.com/1224180", }, { category: "self", summary: "SUSE Bug 1224181", url: "https://bugzilla.suse.com/1224181", }, { category: "self", summary: "SUSE Bug 1224187", url: "https://bugzilla.suse.com/1224187", }, { category: "self", summary: "SUSE Bug 1224331", url: "https://bugzilla.suse.com/1224331", }, { category: "self", summary: "SUSE Bug 1224346", url: "https://bugzilla.suse.com/1224346", }, { category: "self", summary: "SUSE Bug 1224423", url: "https://bugzilla.suse.com/1224423", }, { category: "self", summary: "SUSE Bug 1224432", url: "https://bugzilla.suse.com/1224432", }, { category: "self", summary: "SUSE Bug 1224437", url: "https://bugzilla.suse.com/1224437", }, { category: "self", summary: "SUSE Bug 1224438", url: "https://bugzilla.suse.com/1224438", }, { category: "self", summary: "SUSE Bug 1224442", url: "https://bugzilla.suse.com/1224442", }, { category: "self", summary: "SUSE Bug 1224443", url: "https://bugzilla.suse.com/1224443", }, { category: "self", summary: "SUSE Bug 1224445", url: "https://bugzilla.suse.com/1224445", }, { category: "self", summary: "SUSE Bug 1224449", url: "https://bugzilla.suse.com/1224449", }, { category: "self", summary: "SUSE Bug 1224479", url: "https://bugzilla.suse.com/1224479", }, { category: "self", summary: "SUSE Bug 1224482", url: "https://bugzilla.suse.com/1224482", }, { category: "self", summary: "SUSE Bug 1224487", url: "https://bugzilla.suse.com/1224487", }, { category: "self", summary: "SUSE Bug 1224488", url: "https://bugzilla.suse.com/1224488", }, { category: "self", summary: "SUSE Bug 1224492", url: "https://bugzilla.suse.com/1224492", }, { category: "self", summary: "SUSE Bug 1224494", url: "https://bugzilla.suse.com/1224494", }, { category: "self", summary: "SUSE Bug 1224495", url: "https://bugzilla.suse.com/1224495", }, { category: "self", summary: "SUSE Bug 1224502", url: "https://bugzilla.suse.com/1224502", }, { category: "self", summary: "SUSE Bug 1224508", url: "https://bugzilla.suse.com/1224508", }, { category: "self", summary: "SUSE Bug 1224509", url: "https://bugzilla.suse.com/1224509", }, { category: "self", summary: "SUSE Bug 1224511", url: "https://bugzilla.suse.com/1224511", }, { category: "self", summary: "SUSE Bug 1224519", url: "https://bugzilla.suse.com/1224519", }, { category: "self", summary: "SUSE Bug 1224524", url: "https://bugzilla.suse.com/1224524", }, { category: "self", summary: "SUSE Bug 1224525", url: "https://bugzilla.suse.com/1224525", }, { category: "self", summary: "SUSE Bug 1224530", url: "https://bugzilla.suse.com/1224530", }, { category: "self", summary: "SUSE Bug 1224531", url: "https://bugzilla.suse.com/1224531", }, { category: "self", summary: "SUSE Bug 1224534", url: "https://bugzilla.suse.com/1224534", }, { category: "self", summary: "SUSE Bug 1224535", url: "https://bugzilla.suse.com/1224535", }, { category: "self", summary: "SUSE Bug 1224537", url: "https://bugzilla.suse.com/1224537", }, { category: "self", summary: "SUSE Bug 1224541", url: "https://bugzilla.suse.com/1224541", }, { category: "self", summary: "SUSE Bug 1224543", url: "https://bugzilla.suse.com/1224543", }, { category: "self", summary: "SUSE Bug 1224549", url: "https://bugzilla.suse.com/1224549", }, { category: "self", summary: "SUSE Bug 1224550", url: "https://bugzilla.suse.com/1224550", }, { category: "self", summary: "SUSE Bug 1224558", url: "https://bugzilla.suse.com/1224558", }, { category: "self", summary: "SUSE Bug 1224559", url: "https://bugzilla.suse.com/1224559", }, { category: "self", summary: "SUSE Bug 1224566", url: "https://bugzilla.suse.com/1224566", }, { category: "self", summary: "SUSE Bug 1224567", url: "https://bugzilla.suse.com/1224567", }, { category: "self", summary: "SUSE Bug 1224571", url: "https://bugzilla.suse.com/1224571", }, { category: "self", summary: "SUSE Bug 1224575", url: "https://bugzilla.suse.com/1224575", }, { category: "self", summary: "SUSE Bug 1224576", url: "https://bugzilla.suse.com/1224576", }, { category: "self", summary: "SUSE Bug 1224579", url: "https://bugzilla.suse.com/1224579", }, { category: "self", summary: "SUSE Bug 1224580", url: "https://bugzilla.suse.com/1224580", }, { category: "self", summary: "SUSE Bug 1224581", url: "https://bugzilla.suse.com/1224581", }, { category: "self", summary: "SUSE Bug 1224582", url: "https://bugzilla.suse.com/1224582", }, { category: "self", summary: "SUSE Bug 1224586", url: "https://bugzilla.suse.com/1224586", }, { category: "self", summary: "SUSE Bug 1224587", url: "https://bugzilla.suse.com/1224587", }, { category: "self", summary: "SUSE Bug 1224592", url: "https://bugzilla.suse.com/1224592", }, { category: "self", summary: "SUSE Bug 1224598", url: "https://bugzilla.suse.com/1224598", }, { category: "self", summary: "SUSE Bug 1224601", url: "https://bugzilla.suse.com/1224601", }, { category: "self", summary: "SUSE Bug 1224607", url: "https://bugzilla.suse.com/1224607", }, { category: "self", summary: "SUSE Bug 1224608", url: "https://bugzilla.suse.com/1224608", }, { category: "self", summary: "SUSE Bug 1224611", url: "https://bugzilla.suse.com/1224611", }, { category: "self", summary: "SUSE Bug 1224615", url: "https://bugzilla.suse.com/1224615", }, { category: "self", summary: "SUSE Bug 1224617", url: "https://bugzilla.suse.com/1224617", }, { category: "self", summary: "SUSE Bug 1224618", url: "https://bugzilla.suse.com/1224618", }, { category: "self", summary: "SUSE Bug 1224621", url: "https://bugzilla.suse.com/1224621", }, { category: "self", summary: "SUSE Bug 1224622", url: "https://bugzilla.suse.com/1224622", }, { category: "self", summary: "SUSE Bug 1224624", url: "https://bugzilla.suse.com/1224624", }, { category: "self", summary: "SUSE Bug 1224627", url: "https://bugzilla.suse.com/1224627", }, { category: "self", summary: "SUSE Bug 1224628", url: "https://bugzilla.suse.com/1224628", }, { category: "self", summary: "SUSE Bug 1224629", url: "https://bugzilla.suse.com/1224629", }, { category: "self", summary: "SUSE Bug 1224632", url: "https://bugzilla.suse.com/1224632", }, { category: "self", summary: "SUSE Bug 1224636", url: "https://bugzilla.suse.com/1224636", }, { category: "self", summary: "SUSE Bug 1224637", url: "https://bugzilla.suse.com/1224637", }, { category: "self", summary: "SUSE Bug 1224638", url: "https://bugzilla.suse.com/1224638", }, { category: "self", summary: "SUSE Bug 1224640", url: "https://bugzilla.suse.com/1224640", }, { category: "self", summary: "SUSE Bug 1224643", url: "https://bugzilla.suse.com/1224643", }, { category: "self", summary: "SUSE Bug 1224644", url: "https://bugzilla.suse.com/1224644", }, { category: "self", summary: "SUSE Bug 1224645", url: "https://bugzilla.suse.com/1224645", }, { category: "self", summary: "SUSE Bug 1224647", url: "https://bugzilla.suse.com/1224647", }, { category: "self", summary: "SUSE Bug 1224648", url: "https://bugzilla.suse.com/1224648", }, { category: "self", summary: "SUSE Bug 1224649", url: "https://bugzilla.suse.com/1224649", }, { category: "self", summary: "SUSE Bug 1224650", url: "https://bugzilla.suse.com/1224650", }, { category: "self", summary: "SUSE Bug 1224651", url: "https://bugzilla.suse.com/1224651", }, { category: "self", summary: "SUSE Bug 1224657", url: "https://bugzilla.suse.com/1224657", }, { category: "self", summary: "SUSE Bug 1224659", url: "https://bugzilla.suse.com/1224659", }, { category: "self", summary: "SUSE Bug 1224660", url: "https://bugzilla.suse.com/1224660", }, { category: "self", summary: "SUSE Bug 1224663", url: "https://bugzilla.suse.com/1224663", }, { category: "self", summary: "SUSE Bug 1224664", url: "https://bugzilla.suse.com/1224664", }, { category: "self", summary: "SUSE Bug 1224665", url: "https://bugzilla.suse.com/1224665", }, { category: "self", summary: "SUSE Bug 1224666", url: "https://bugzilla.suse.com/1224666", }, { category: "self", summary: "SUSE Bug 1224667", url: "https://bugzilla.suse.com/1224667", }, { category: "self", summary: "SUSE Bug 1224668", url: "https://bugzilla.suse.com/1224668", }, { category: "self", summary: "SUSE Bug 1224671", url: "https://bugzilla.suse.com/1224671", }, { category: "self", summary: "SUSE Bug 1224672", url: "https://bugzilla.suse.com/1224672", }, { category: "self", summary: "SUSE Bug 1224676", url: "https://bugzilla.suse.com/1224676", }, { category: "self", summary: "SUSE Bug 1224678", url: "https://bugzilla.suse.com/1224678", }, { category: "self", summary: "SUSE Bug 1224679", url: "https://bugzilla.suse.com/1224679", }, { category: "self", summary: "SUSE Bug 1224680", url: "https://bugzilla.suse.com/1224680", }, { category: "self", summary: "SUSE Bug 1224681", url: "https://bugzilla.suse.com/1224681", }, { category: "self", summary: "SUSE Bug 1224682", url: "https://bugzilla.suse.com/1224682", }, { category: "self", summary: "SUSE Bug 1224685", url: "https://bugzilla.suse.com/1224685", }, { category: "self", summary: "SUSE Bug 1224686", url: "https://bugzilla.suse.com/1224686", }, { category: "self", summary: "SUSE Bug 1224692", url: "https://bugzilla.suse.com/1224692", }, { category: "self", summary: "SUSE Bug 1224697", url: "https://bugzilla.suse.com/1224697", }, { category: "self", summary: "SUSE Bug 1224699", url: "https://bugzilla.suse.com/1224699", }, { category: "self", summary: "SUSE Bug 1224701", url: "https://bugzilla.suse.com/1224701", }, { category: "self", summary: "SUSE Bug 1224703", url: "https://bugzilla.suse.com/1224703", }, { category: "self", summary: "SUSE Bug 1224705", url: "https://bugzilla.suse.com/1224705", }, { category: "self", summary: "SUSE Bug 1224707", url: "https://bugzilla.suse.com/1224707", }, { category: "self", summary: "SUSE Bug 1224717", url: "https://bugzilla.suse.com/1224717", }, { category: "self", summary: "SUSE Bug 1224718", url: "https://bugzilla.suse.com/1224718", }, { category: "self", summary: "SUSE Bug 1224721", url: "https://bugzilla.suse.com/1224721", }, { category: "self", summary: "SUSE Bug 1224722", url: "https://bugzilla.suse.com/1224722", }, { category: "self", summary: "SUSE Bug 1224723", url: "https://bugzilla.suse.com/1224723", }, { category: "self", summary: "SUSE Bug 1224725", url: "https://bugzilla.suse.com/1224725", }, { category: "self", summary: "SUSE Bug 1224727", url: "https://bugzilla.suse.com/1224727", }, { category: "self", summary: "SUSE Bug 1224728", url: "https://bugzilla.suse.com/1224728", }, { category: "self", summary: "SUSE Bug 1224729", url: "https://bugzilla.suse.com/1224729", }, { category: "self", summary: "SUSE Bug 1224730", url: "https://bugzilla.suse.com/1224730", }, { category: "self", summary: "SUSE Bug 1224731", url: "https://bugzilla.suse.com/1224731", }, { category: "self", summary: "SUSE Bug 1224732", url: "https://bugzilla.suse.com/1224732", }, { category: "self", summary: "SUSE Bug 1224733", url: "https://bugzilla.suse.com/1224733", }, { category: "self", summary: "SUSE Bug 1224736", url: "https://bugzilla.suse.com/1224736", }, { category: "self", summary: "SUSE Bug 1224738", url: "https://bugzilla.suse.com/1224738", }, { category: "self", summary: "SUSE Bug 1224739", url: "https://bugzilla.suse.com/1224739", }, { category: "self", summary: "SUSE Bug 1224740", url: "https://bugzilla.suse.com/1224740", }, { category: "self", summary: "SUSE Bug 1224747", url: "https://bugzilla.suse.com/1224747", }, { category: "self", summary: "SUSE Bug 1224749", url: "https://bugzilla.suse.com/1224749", }, { category: "self", summary: "SUSE Bug 1224759", url: "https://bugzilla.suse.com/1224759", }, { category: "self", summary: "SUSE Bug 1224763", url: "https://bugzilla.suse.com/1224763", }, { category: "self", summary: "SUSE Bug 1224764", url: "https://bugzilla.suse.com/1224764", }, { category: "self", summary: "SUSE Bug 1224765", url: "https://bugzilla.suse.com/1224765", }, { category: "self", summary: "SUSE Bug 1224766", url: "https://bugzilla.suse.com/1224766", }, { category: "self", summary: "SUSE Bug 1224794", url: "https://bugzilla.suse.com/1224794", }, { category: "self", summary: "SUSE Bug 1224795", url: "https://bugzilla.suse.com/1224795", }, { category: "self", summary: "SUSE Bug 1224796", url: "https://bugzilla.suse.com/1224796", }, { category: "self", summary: "SUSE Bug 1224803", url: "https://bugzilla.suse.com/1224803", }, { category: "self", summary: "SUSE Bug 1224816", url: "https://bugzilla.suse.com/1224816", }, { category: "self", summary: "SUSE Bug 1224895", url: "https://bugzilla.suse.com/1224895", }, { category: "self", summary: "SUSE Bug 1224898", url: "https://bugzilla.suse.com/1224898", }, { category: "self", summary: "SUSE Bug 1224900", url: "https://bugzilla.suse.com/1224900", }, { category: "self", summary: "SUSE Bug 1224901", url: "https://bugzilla.suse.com/1224901", }, { category: "self", summary: "SUSE Bug 1224902", url: "https://bugzilla.suse.com/1224902", }, { category: "self", summary: "SUSE Bug 1224903", url: "https://bugzilla.suse.com/1224903", }, { category: "self", summary: "SUSE Bug 1224904", url: "https://bugzilla.suse.com/1224904", }, { category: "self", summary: "SUSE Bug 1224905", url: "https://bugzilla.suse.com/1224905", }, { category: "self", summary: "SUSE Bug 1224907", url: "https://bugzilla.suse.com/1224907", }, { category: "self", summary: "SUSE Bug 1224909", url: "https://bugzilla.suse.com/1224909", }, { category: "self", summary: "SUSE Bug 1224910", url: "https://bugzilla.suse.com/1224910", }, { category: "self", summary: "SUSE Bug 1224911", url: "https://bugzilla.suse.com/1224911", }, { category: "self", summary: "SUSE Bug 1224912", url: "https://bugzilla.suse.com/1224912", }, { category: "self", summary: "SUSE Bug 1224913", url: "https://bugzilla.suse.com/1224913", }, { category: "self", summary: "SUSE Bug 1224914", url: "https://bugzilla.suse.com/1224914", }, { category: "self", summary: "SUSE Bug 1224915", url: "https://bugzilla.suse.com/1224915", }, { category: "self", summary: "SUSE Bug 1224920", url: "https://bugzilla.suse.com/1224920", }, { category: "self", summary: "SUSE Bug 1224928", url: "https://bugzilla.suse.com/1224928", }, { category: "self", summary: "SUSE Bug 1224929", url: "https://bugzilla.suse.com/1224929", }, { category: "self", summary: "SUSE Bug 1224930", url: "https://bugzilla.suse.com/1224930", }, { category: "self", summary: "SUSE Bug 1224931", url: "https://bugzilla.suse.com/1224931", }, { category: "self", summary: "SUSE Bug 1224932", url: "https://bugzilla.suse.com/1224932", }, { category: "self", summary: "SUSE Bug 1224936", url: "https://bugzilla.suse.com/1224936", }, { category: "self", summary: "SUSE Bug 1224937", url: "https://bugzilla.suse.com/1224937", }, { category: "self", summary: "SUSE Bug 1224941", url: "https://bugzilla.suse.com/1224941", }, { category: "self", summary: "SUSE Bug 1224942", url: "https://bugzilla.suse.com/1224942", }, { category: "self", summary: "SUSE Bug 1224944", url: "https://bugzilla.suse.com/1224944", }, { category: "self", summary: "SUSE Bug 1224945", url: "https://bugzilla.suse.com/1224945", }, { category: "self", summary: "SUSE Bug 1224947", url: "https://bugzilla.suse.com/1224947", }, { category: "self", summary: "SUSE Bug 1224956", url: "https://bugzilla.suse.com/1224956", }, { category: "self", summary: "SUSE Bug 1224988", url: "https://bugzilla.suse.com/1224988", }, { category: "self", summary: "SUSE Bug 1224992", url: "https://bugzilla.suse.com/1224992", }, { category: "self", summary: "SUSE Bug 1225000", url: "https://bugzilla.suse.com/1225000", }, { category: "self", summary: "SUSE Bug 1225003", url: "https://bugzilla.suse.com/1225003", }, { category: "self", summary: "SUSE Bug 1225005", url: "https://bugzilla.suse.com/1225005", }, { category: "self", summary: "SUSE Bug 1225008", url: "https://bugzilla.suse.com/1225008", }, { category: "self", summary: "SUSE Bug 1225009", url: "https://bugzilla.suse.com/1225009", }, { category: "self", summary: "SUSE Bug 1225022", url: "https://bugzilla.suse.com/1225022", }, { category: "self", summary: "SUSE Bug 1225031", url: "https://bugzilla.suse.com/1225031", }, { category: "self", summary: "SUSE Bug 1225032", url: "https://bugzilla.suse.com/1225032", }, { category: "self", summary: "SUSE Bug 1225036", url: "https://bugzilla.suse.com/1225036", }, { category: "self", summary: "SUSE Bug 1225041", url: "https://bugzilla.suse.com/1225041", }, { category: "self", summary: "SUSE Bug 1225044", url: "https://bugzilla.suse.com/1225044", }, { category: "self", summary: "SUSE Bug 1225053", url: "https://bugzilla.suse.com/1225053", }, { category: "self", summary: "SUSE Bug 1225076", url: "https://bugzilla.suse.com/1225076", }, { category: "self", summary: "SUSE Bug 1225077", url: "https://bugzilla.suse.com/1225077", }, { category: "self", summary: "SUSE Bug 1225082", url: "https://bugzilla.suse.com/1225082", }, { category: "self", summary: "SUSE Bug 1225085", url: "https://bugzilla.suse.com/1225085", }, { category: "self", summary: "SUSE Bug 1225086", url: "https://bugzilla.suse.com/1225086", }, { category: "self", summary: "SUSE Bug 1225092", url: "https://bugzilla.suse.com/1225092", }, { category: "self", summary: "SUSE Bug 1225095", url: "https://bugzilla.suse.com/1225095", }, { category: "self", summary: "SUSE Bug 1225096", url: "https://bugzilla.suse.com/1225096", }, { category: "self", summary: "SUSE Bug 1225097", url: "https://bugzilla.suse.com/1225097", }, { category: "self", summary: "SUSE Bug 1225106", url: "https://bugzilla.suse.com/1225106", }, { category: "self", summary: "SUSE Bug 1225108", url: "https://bugzilla.suse.com/1225108", }, { category: "self", summary: "SUSE Bug 1225109", url: "https://bugzilla.suse.com/1225109", }, { category: "self", summary: "SUSE Bug 1225114", url: "https://bugzilla.suse.com/1225114", }, { category: "self", summary: "SUSE Bug 1225118", url: "https://bugzilla.suse.com/1225118", }, { category: "self", summary: "SUSE Bug 1225121", url: "https://bugzilla.suse.com/1225121", }, { category: "self", summary: "SUSE Bug 1225122", url: "https://bugzilla.suse.com/1225122", }, { category: "self", summary: "SUSE Bug 1225123", url: "https://bugzilla.suse.com/1225123", }, { category: "self", summary: "SUSE Bug 1225125", url: "https://bugzilla.suse.com/1225125", }, { category: "self", summary: "SUSE Bug 1225126", url: "https://bugzilla.suse.com/1225126", }, { category: "self", summary: "SUSE Bug 1225127", url: "https://bugzilla.suse.com/1225127", }, { category: "self", summary: "SUSE Bug 1225129", url: "https://bugzilla.suse.com/1225129", }, { category: "self", summary: "SUSE Bug 1225131", url: "https://bugzilla.suse.com/1225131", }, { category: "self", summary: "SUSE Bug 1225132", url: "https://bugzilla.suse.com/1225132", }, { category: "self", summary: "SUSE Bug 1225138", url: "https://bugzilla.suse.com/1225138", }, { category: "self", summary: "SUSE Bug 1225139", url: "https://bugzilla.suse.com/1225139", }, { category: "self", summary: "SUSE Bug 1225145", url: "https://bugzilla.suse.com/1225145", }, { category: "self", summary: "SUSE Bug 1225151", url: "https://bugzilla.suse.com/1225151", }, { category: "self", summary: "SUSE Bug 1225153", url: "https://bugzilla.suse.com/1225153", }, { category: "self", summary: "SUSE Bug 1225156", url: "https://bugzilla.suse.com/1225156", }, { category: "self", summary: "SUSE Bug 1225158", url: "https://bugzilla.suse.com/1225158", }, { category: "self", summary: "SUSE Bug 1225160", url: "https://bugzilla.suse.com/1225160", }, { category: "self", summary: "SUSE Bug 1225161", url: "https://bugzilla.suse.com/1225161", }, { category: "self", summary: "SUSE Bug 1225164", url: "https://bugzilla.suse.com/1225164", }, { category: "self", summary: "SUSE Bug 1225167", url: "https://bugzilla.suse.com/1225167", }, { category: "self", summary: "SUSE Bug 1225180", url: "https://bugzilla.suse.com/1225180", }, { category: "self", summary: "SUSE Bug 1225183", url: "https://bugzilla.suse.com/1225183", }, { category: "self", summary: "SUSE Bug 1225184", url: "https://bugzilla.suse.com/1225184", }, { category: "self", summary: "SUSE Bug 1225186", url: "https://bugzilla.suse.com/1225186", }, { category: "self", summary: "SUSE Bug 1225187", url: "https://bugzilla.suse.com/1225187", }, { category: "self", summary: "SUSE Bug 1225189", url: "https://bugzilla.suse.com/1225189", }, { category: "self", summary: "SUSE Bug 1225190", url: "https://bugzilla.suse.com/1225190", }, { category: "self", summary: "SUSE Bug 1225191", url: "https://bugzilla.suse.com/1225191", }, { category: "self", summary: "SUSE Bug 1225192", url: "https://bugzilla.suse.com/1225192", }, { category: "self", summary: "SUSE Bug 1225193", url: "https://bugzilla.suse.com/1225193", }, { category: "self", summary: "SUSE Bug 1225195", url: "https://bugzilla.suse.com/1225195", }, { category: "self", summary: "SUSE Bug 1225198", url: "https://bugzilla.suse.com/1225198", }, { category: "self", summary: "SUSE Bug 1225201", url: "https://bugzilla.suse.com/1225201", }, { category: "self", summary: "SUSE Bug 1225203", url: "https://bugzilla.suse.com/1225203", }, { category: "self", summary: "SUSE Bug 1225205", url: "https://bugzilla.suse.com/1225205", }, { category: "self", summary: "SUSE Bug 1225206", url: "https://bugzilla.suse.com/1225206", }, { category: "self", summary: "SUSE Bug 1225207", url: "https://bugzilla.suse.com/1225207", }, { category: "self", summary: "SUSE Bug 1225208", url: "https://bugzilla.suse.com/1225208", }, { category: "self", summary: "SUSE Bug 1225209", url: "https://bugzilla.suse.com/1225209", }, { category: "self", summary: "SUSE Bug 1225210", url: "https://bugzilla.suse.com/1225210", }, { category: "self", summary: "SUSE Bug 1225214", url: "https://bugzilla.suse.com/1225214", }, { category: "self", summary: "SUSE Bug 1225222", url: "https://bugzilla.suse.com/1225222", }, { category: "self", summary: "SUSE Bug 1225223", url: "https://bugzilla.suse.com/1225223", }, { category: "self", summary: "SUSE Bug 1225224", url: "https://bugzilla.suse.com/1225224", }, { category: "self", summary: "SUSE Bug 1225225", url: "https://bugzilla.suse.com/1225225", }, { category: "self", summary: "SUSE Bug 1225227", url: "https://bugzilla.suse.com/1225227", }, { category: "self", summary: "SUSE Bug 1225228", url: "https://bugzilla.suse.com/1225228", }, { category: "self", summary: "SUSE Bug 1225229", url: "https://bugzilla.suse.com/1225229", }, { category: "self", summary: "SUSE Bug 1225230", url: "https://bugzilla.suse.com/1225230", }, { category: "self", summary: "SUSE Bug 1225232", url: "https://bugzilla.suse.com/1225232", }, { category: "self", summary: "SUSE Bug 1225233", url: "https://bugzilla.suse.com/1225233", }, { category: "self", summary: "SUSE Bug 1225235", url: "https://bugzilla.suse.com/1225235", }, { category: "self", summary: "SUSE Bug 1225236", url: "https://bugzilla.suse.com/1225236", }, { category: "self", summary: "SUSE Bug 1225237", url: "https://bugzilla.suse.com/1225237", }, { category: "self", summary: "SUSE Bug 1225238", url: "https://bugzilla.suse.com/1225238", }, { category: "self", summary: "SUSE Bug 1225239", url: "https://bugzilla.suse.com/1225239", }, { category: "self", summary: "SUSE Bug 1225240", url: "https://bugzilla.suse.com/1225240", }, { category: "self", summary: "SUSE Bug 1225241", url: "https://bugzilla.suse.com/1225241", }, { category: "self", summary: "SUSE Bug 1225242", url: "https://bugzilla.suse.com/1225242", }, { category: "self", summary: "SUSE Bug 1225243", url: "https://bugzilla.suse.com/1225243", }, { category: "self", summary: "SUSE Bug 1225244", url: "https://bugzilla.suse.com/1225244", }, { category: "self", summary: "SUSE Bug 1225245", url: "https://bugzilla.suse.com/1225245", }, { category: "self", summary: "SUSE Bug 1225246", url: "https://bugzilla.suse.com/1225246", }, { category: "self", summary: "SUSE Bug 1225247", url: "https://bugzilla.suse.com/1225247", }, { category: "self", summary: "SUSE Bug 1225248", url: "https://bugzilla.suse.com/1225248", }, { category: "self", summary: "SUSE Bug 1225249", url: "https://bugzilla.suse.com/1225249", }, { category: "self", summary: "SUSE Bug 1225250", url: "https://bugzilla.suse.com/1225250", }, { category: "self", summary: "SUSE Bug 1225251", url: "https://bugzilla.suse.com/1225251", }, { category: "self", summary: "SUSE Bug 1225252", url: "https://bugzilla.suse.com/1225252", }, { category: "self", summary: "SUSE Bug 1225253", url: "https://bugzilla.suse.com/1225253", }, { category: "self", summary: "SUSE Bug 1225254", url: "https://bugzilla.suse.com/1225254", }, { category: "self", summary: "SUSE Bug 1225255", url: "https://bugzilla.suse.com/1225255", }, { category: "self", summary: "SUSE Bug 1225256", url: "https://bugzilla.suse.com/1225256", }, { category: "self", summary: "SUSE Bug 1225257", url: "https://bugzilla.suse.com/1225257", }, { category: "self", summary: "SUSE Bug 1225258", url: "https://bugzilla.suse.com/1225258", }, { category: "self", summary: "SUSE Bug 1225259", url: "https://bugzilla.suse.com/1225259", }, { category: "self", summary: "SUSE Bug 1225260", url: "https://bugzilla.suse.com/1225260", }, { category: "self", summary: "SUSE Bug 1225261", url: "https://bugzilla.suse.com/1225261", }, { category: "self", summary: "SUSE Bug 1225262", url: "https://bugzilla.suse.com/1225262", }, { category: "self", summary: "SUSE Bug 1225263", url: "https://bugzilla.suse.com/1225263", }, { category: "self", summary: "SUSE Bug 1225268", url: "https://bugzilla.suse.com/1225268", }, { category: "self", summary: "SUSE Bug 1225301", url: "https://bugzilla.suse.com/1225301", }, { category: "self", summary: "SUSE Bug 1225303", url: "https://bugzilla.suse.com/1225303", }, { category: "self", summary: "SUSE Bug 1225304", url: "https://bugzilla.suse.com/1225304", }, { category: "self", summary: "SUSE Bug 1225306", url: "https://bugzilla.suse.com/1225306", }, { category: "self", summary: "SUSE Bug 1225316", url: "https://bugzilla.suse.com/1225316", }, { category: "self", summary: "SUSE Bug 1225318", url: "https://bugzilla.suse.com/1225318", }, { category: "self", summary: "SUSE Bug 1225320", url: "https://bugzilla.suse.com/1225320", }, { category: "self", summary: "SUSE Bug 1225321", url: "https://bugzilla.suse.com/1225321", }, { category: "self", summary: "SUSE Bug 1225322", url: "https://bugzilla.suse.com/1225322", }, { category: "self", summary: "SUSE Bug 1225323", url: "https://bugzilla.suse.com/1225323", }, { category: "self", summary: "SUSE Bug 1225326", url: "https://bugzilla.suse.com/1225326", }, { category: "self", summary: "SUSE Bug 1225327", url: "https://bugzilla.suse.com/1225327", }, { category: "self", summary: "SUSE Bug 1225328", url: "https://bugzilla.suse.com/1225328", }, { category: "self", summary: "SUSE Bug 1225329", url: "https://bugzilla.suse.com/1225329", }, { category: "self", summary: "SUSE Bug 1225330", url: "https://bugzilla.suse.com/1225330", }, { category: "self", summary: "SUSE Bug 1225331", url: "https://bugzilla.suse.com/1225331", }, { category: "self", summary: "SUSE Bug 1225332", url: "https://bugzilla.suse.com/1225332", }, { category: "self", summary: "SUSE Bug 1225333", url: "https://bugzilla.suse.com/1225333", }, { category: "self", summary: "SUSE Bug 1225334", url: "https://bugzilla.suse.com/1225334", }, { category: "self", summary: "SUSE Bug 1225335", url: "https://bugzilla.suse.com/1225335", }, { category: "self", summary: "SUSE Bug 1225336", url: "https://bugzilla.suse.com/1225336", }, { category: "self", summary: "SUSE Bug 1225337", url: "https://bugzilla.suse.com/1225337", }, { category: "self", summary: "SUSE Bug 1225338", url: "https://bugzilla.suse.com/1225338", }, { category: "self", summary: "SUSE Bug 1225339", url: "https://bugzilla.suse.com/1225339", }, { category: "self", summary: "SUSE Bug 1225341", url: "https://bugzilla.suse.com/1225341", }, { category: "self", summary: "SUSE Bug 1225342", url: "https://bugzilla.suse.com/1225342", }, { category: "self", summary: "SUSE Bug 1225344", url: "https://bugzilla.suse.com/1225344", }, { category: "self", summary: "SUSE Bug 1225346", url: "https://bugzilla.suse.com/1225346", }, { category: "self", summary: "SUSE Bug 1225347", url: "https://bugzilla.suse.com/1225347", }, { category: "self", summary: "SUSE Bug 1225351", url: "https://bugzilla.suse.com/1225351", }, { category: "self", summary: "SUSE Bug 1225353", url: "https://bugzilla.suse.com/1225353", }, { category: "self", summary: "SUSE Bug 1225354", url: "https://bugzilla.suse.com/1225354", }, { category: "self", summary: "SUSE Bug 1225355", url: "https://bugzilla.suse.com/1225355", }, { category: "self", summary: "SUSE Bug 1225357", url: "https://bugzilla.suse.com/1225357", }, { category: "self", summary: "SUSE Bug 1225358", url: "https://bugzilla.suse.com/1225358", }, { category: "self", summary: "SUSE Bug 1225360", url: "https://bugzilla.suse.com/1225360", }, { category: "self", summary: "SUSE Bug 1225361", url: "https://bugzilla.suse.com/1225361", }, { category: "self", summary: "SUSE Bug 1225366", url: "https://bugzilla.suse.com/1225366", }, { category: "self", summary: "SUSE Bug 1225367", url: "https://bugzilla.suse.com/1225367", }, { category: "self", summary: "SUSE Bug 1225368", url: "https://bugzilla.suse.com/1225368", }, { category: "self", summary: "SUSE Bug 1225369", url: "https://bugzilla.suse.com/1225369", }, { category: "self", summary: "SUSE Bug 1225370", url: "https://bugzilla.suse.com/1225370", }, { category: "self", summary: "SUSE Bug 1225372", url: "https://bugzilla.suse.com/1225372", }, { category: "self", summary: "SUSE Bug 1225373", url: "https://bugzilla.suse.com/1225373", }, { category: "self", summary: "SUSE Bug 1225374", url: "https://bugzilla.suse.com/1225374", }, { category: "self", summary: "SUSE Bug 1225375", url: "https://bugzilla.suse.com/1225375", }, { category: "self", summary: "SUSE Bug 1225376", url: "https://bugzilla.suse.com/1225376", }, { category: "self", summary: "SUSE Bug 1225377", url: "https://bugzilla.suse.com/1225377", }, { category: "self", summary: "SUSE Bug 1225379", url: "https://bugzilla.suse.com/1225379", }, { category: "self", summary: "SUSE Bug 1225380", url: "https://bugzilla.suse.com/1225380", }, { category: "self", summary: "SUSE Bug 1225382", url: "https://bugzilla.suse.com/1225382", }, { category: "self", summary: "SUSE Bug 1225383", url: "https://bugzilla.suse.com/1225383", }, { category: "self", summary: "SUSE Bug 1225384", url: "https://bugzilla.suse.com/1225384", }, { category: "self", summary: "SUSE Bug 1225386", url: "https://bugzilla.suse.com/1225386", }, { category: "self", summary: "SUSE Bug 1225387", url: "https://bugzilla.suse.com/1225387", }, { category: "self", summary: "SUSE Bug 1225388", url: "https://bugzilla.suse.com/1225388", }, { category: "self", summary: "SUSE Bug 1225390", url: "https://bugzilla.suse.com/1225390", }, { category: "self", summary: "SUSE Bug 1225392", url: "https://bugzilla.suse.com/1225392", }, { category: "self", summary: "SUSE Bug 1225393", url: "https://bugzilla.suse.com/1225393", }, { category: "self", summary: "SUSE Bug 1225396", url: "https://bugzilla.suse.com/1225396", }, { category: "self", summary: "SUSE Bug 1225400", url: "https://bugzilla.suse.com/1225400", }, { category: "self", summary: "SUSE Bug 1225404", url: "https://bugzilla.suse.com/1225404", }, { category: "self", summary: "SUSE Bug 1225405", url: "https://bugzilla.suse.com/1225405", }, { category: "self", summary: "SUSE Bug 1225408", url: "https://bugzilla.suse.com/1225408", }, { category: "self", summary: "SUSE Bug 1225409", url: "https://bugzilla.suse.com/1225409", }, { category: "self", summary: "SUSE Bug 1225410", url: "https://bugzilla.suse.com/1225410", }, { category: "self", summary: "SUSE Bug 1225411", url: "https://bugzilla.suse.com/1225411", }, { category: "self", summary: "SUSE Bug 1225424", url: "https://bugzilla.suse.com/1225424", }, { category: "self", summary: "SUSE Bug 1225425", url: "https://bugzilla.suse.com/1225425", }, { category: "self", summary: "SUSE Bug 1225427", url: "https://bugzilla.suse.com/1225427", }, { category: "self", summary: "SUSE Bug 1225431", url: "https://bugzilla.suse.com/1225431", }, { category: "self", summary: "SUSE Bug 1225435", url: "https://bugzilla.suse.com/1225435", }, { category: "self", summary: "SUSE Bug 1225436", url: "https://bugzilla.suse.com/1225436", }, { category: "self", summary: "SUSE Bug 1225437", url: "https://bugzilla.suse.com/1225437", }, { category: "self", summary: "SUSE Bug 1225438", url: "https://bugzilla.suse.com/1225438", }, { category: "self", summary: "SUSE Bug 1225439", url: "https://bugzilla.suse.com/1225439", }, { category: "self", summary: "SUSE Bug 1225441", url: "https://bugzilla.suse.com/1225441", }, { category: "self", summary: "SUSE Bug 1225442", url: "https://bugzilla.suse.com/1225442", }, { category: "self", summary: "SUSE Bug 1225443", url: "https://bugzilla.suse.com/1225443", }, { category: "self", summary: "SUSE Bug 1225444", url: "https://bugzilla.suse.com/1225444", }, { category: "self", summary: "SUSE Bug 1225445", url: "https://bugzilla.suse.com/1225445", }, { category: "self", summary: "SUSE Bug 1225446", url: "https://bugzilla.suse.com/1225446", }, { category: "self", summary: "SUSE Bug 1225447", url: "https://bugzilla.suse.com/1225447", }, { category: "self", summary: "SUSE Bug 1225450", url: "https://bugzilla.suse.com/1225450", }, { category: "self", summary: "SUSE Bug 1225453", url: "https://bugzilla.suse.com/1225453", }, { category: "self", summary: "SUSE Bug 1225455", url: "https://bugzilla.suse.com/1225455", }, { category: "self", summary: "SUSE Bug 1225461", url: "https://bugzilla.suse.com/1225461", }, { category: "self", summary: "SUSE Bug 1225463", url: "https://bugzilla.suse.com/1225463", }, { category: "self", summary: "SUSE Bug 1225464", url: "https://bugzilla.suse.com/1225464", }, { category: "self", summary: "SUSE Bug 1225466", url: "https://bugzilla.suse.com/1225466", }, { category: "self", summary: "SUSE Bug 1225467", url: "https://bugzilla.suse.com/1225467", }, { category: "self", summary: "SUSE Bug 1225468", url: "https://bugzilla.suse.com/1225468", }, { category: "self", summary: "SUSE Bug 1225471", url: "https://bugzilla.suse.com/1225471", }, { category: "self", summary: "SUSE Bug 1225472", url: "https://bugzilla.suse.com/1225472", }, { category: "self", summary: "SUSE Bug 1225478", url: "https://bugzilla.suse.com/1225478", }, { category: "self", summary: "SUSE Bug 1225479", url: "https://bugzilla.suse.com/1225479", }, { category: "self", summary: "SUSE Bug 1225480", url: "https://bugzilla.suse.com/1225480", }, { category: "self", summary: "SUSE Bug 1225482", url: "https://bugzilla.suse.com/1225482", }, { category: "self", summary: "SUSE Bug 1225483", url: "https://bugzilla.suse.com/1225483", }, { category: "self", summary: "SUSE Bug 1225486", url: "https://bugzilla.suse.com/1225486", }, { category: "self", summary: "SUSE Bug 1225488", url: "https://bugzilla.suse.com/1225488", }, { category: "self", summary: "SUSE Bug 1225490", url: "https://bugzilla.suse.com/1225490", }, { category: "self", summary: "SUSE Bug 1225492", url: "https://bugzilla.suse.com/1225492", }, { category: "self", summary: "SUSE Bug 1225495", url: "https://bugzilla.suse.com/1225495", }, { category: "self", summary: "SUSE Bug 1225499", url: "https://bugzilla.suse.com/1225499", }, { category: "self", summary: "SUSE Bug 1225500", url: "https://bugzilla.suse.com/1225500", }, { category: "self", summary: "SUSE Bug 1225501", url: "https://bugzilla.suse.com/1225501", }, { category: "self", summary: "SUSE Bug 1225502", url: "https://bugzilla.suse.com/1225502", }, { category: "self", summary: "SUSE Bug 1225506", url: "https://bugzilla.suse.com/1225506", }, { category: "self", summary: "SUSE Bug 1225508", url: "https://bugzilla.suse.com/1225508", }, { category: "self", summary: "SUSE Bug 1225510", url: "https://bugzilla.suse.com/1225510", }, { category: "self", summary: "SUSE Bug 1225513", url: "https://bugzilla.suse.com/1225513", }, { category: "self", summary: "SUSE Bug 1225515", url: "https://bugzilla.suse.com/1225515", }, { category: "self", summary: "SUSE Bug 1225529", url: "https://bugzilla.suse.com/1225529", }, { category: "self", summary: "SUSE Bug 1225530", url: "https://bugzilla.suse.com/1225530", }, { category: "self", summary: "SUSE Bug 1225532", url: "https://bugzilla.suse.com/1225532", }, { category: "self", summary: "SUSE Bug 1225534", url: "https://bugzilla.suse.com/1225534", }, { category: "self", summary: "SUSE Bug 1225535", url: "https://bugzilla.suse.com/1225535", }, { category: "self", summary: "SUSE Bug 1225548", url: "https://bugzilla.suse.com/1225548", }, { category: "self", summary: "SUSE Bug 1225549", url: "https://bugzilla.suse.com/1225549", }, { category: "self", summary: "SUSE Bug 1225550", url: "https://bugzilla.suse.com/1225550", }, { category: "self", summary: "SUSE Bug 1225553", url: "https://bugzilla.suse.com/1225553", }, { category: "self", summary: "SUSE Bug 1225554", url: "https://bugzilla.suse.com/1225554", }, { category: "self", summary: "SUSE Bug 1225555", url: "https://bugzilla.suse.com/1225555", }, { category: "self", summary: "SUSE Bug 1225556", url: "https://bugzilla.suse.com/1225556", }, { category: "self", summary: "SUSE Bug 1225557", url: "https://bugzilla.suse.com/1225557", }, { category: "self", summary: "SUSE Bug 1225559", url: "https://bugzilla.suse.com/1225559", }, { category: "self", summary: "SUSE Bug 1225560", url: "https://bugzilla.suse.com/1225560", }, { category: "self", summary: "SUSE Bug 1225565", url: "https://bugzilla.suse.com/1225565", }, { category: "self", summary: "SUSE Bug 1225566", url: "https://bugzilla.suse.com/1225566", }, { category: "self", summary: "SUSE Bug 1225568", url: "https://bugzilla.suse.com/1225568", }, { category: "self", summary: "SUSE Bug 1225569", url: "https://bugzilla.suse.com/1225569", }, { category: "self", summary: "SUSE Bug 1225570", url: "https://bugzilla.suse.com/1225570", }, { category: "self", summary: "SUSE Bug 1225571", url: "https://bugzilla.suse.com/1225571", }, { category: "self", summary: "SUSE Bug 1225572", url: "https://bugzilla.suse.com/1225572", }, { category: "self", summary: "SUSE Bug 1225577", url: "https://bugzilla.suse.com/1225577", }, { category: "self", summary: "SUSE Bug 1225583", url: "https://bugzilla.suse.com/1225583", }, { category: "self", summary: "SUSE Bug 1225584", url: "https://bugzilla.suse.com/1225584", }, { category: "self", summary: "SUSE Bug 1225587", url: "https://bugzilla.suse.com/1225587", }, { category: "self", summary: "SUSE Bug 1225588", url: "https://bugzilla.suse.com/1225588", }, { category: "self", summary: "SUSE Bug 1225589", url: "https://bugzilla.suse.com/1225589", }, { category: "self", summary: "SUSE Bug 1225590", url: "https://bugzilla.suse.com/1225590", }, { category: "self", summary: "SUSE Bug 1225591", url: "https://bugzilla.suse.com/1225591", }, { category: "self", summary: "SUSE Bug 1225592", url: "https://bugzilla.suse.com/1225592", }, { category: "self", summary: "SUSE Bug 1225593", url: "https://bugzilla.suse.com/1225593", }, { category: "self", summary: "SUSE Bug 1225595", url: "https://bugzilla.suse.com/1225595", }, { category: "self", summary: "SUSE Bug 1225599", url: "https://bugzilla.suse.com/1225599", }, { category: "self", summary: "SUSE Bug 1225616", url: "https://bugzilla.suse.com/1225616", }, { category: "self", summary: "SUSE Bug 1225640", url: "https://bugzilla.suse.com/1225640", }, { category: "self", summary: "SUSE Bug 1225642", url: "https://bugzilla.suse.com/1225642", }, { category: "self", summary: "SUSE Bug 1225705", url: "https://bugzilla.suse.com/1225705", }, { category: "self", summary: "SUSE Bug 1225708", url: "https://bugzilla.suse.com/1225708", }, { category: "self", summary: "SUSE Bug 1225715", url: "https://bugzilla.suse.com/1225715", }, { category: "self", summary: "SUSE Bug 1225720", url: "https://bugzilla.suse.com/1225720", }, { category: "self", summary: "SUSE Bug 1225722", url: "https://bugzilla.suse.com/1225722", }, { category: "self", summary: "SUSE Bug 1225734", url: "https://bugzilla.suse.com/1225734", }, { category: "self", summary: "SUSE Bug 1225735", url: "https://bugzilla.suse.com/1225735", }, { category: "self", summary: "SUSE Bug 1225747", url: "https://bugzilla.suse.com/1225747", }, { category: "self", summary: "SUSE Bug 1225748", url: "https://bugzilla.suse.com/1225748", }, { category: "self", summary: "SUSE Bug 1225756", url: "https://bugzilla.suse.com/1225756", }, { category: "self", summary: "SUSE Bug 1225761", url: "https://bugzilla.suse.com/1225761", }, { category: "self", summary: "SUSE Bug 1225766", url: "https://bugzilla.suse.com/1225766", }, { category: "self", summary: "SUSE Bug 1225775", url: "https://bugzilla.suse.com/1225775", }, { category: "self", summary: "SUSE Bug 1225810", url: "https://bugzilla.suse.com/1225810", }, { category: "self", summary: "SUSE Bug 1225820", url: "https://bugzilla.suse.com/1225820", }, { category: "self", summary: "SUSE Bug 1225829", url: "https://bugzilla.suse.com/1225829", }, { category: "self", summary: "SUSE Bug 1225835", url: "https://bugzilla.suse.com/1225835", }, { category: "self", summary: "SUSE Bug 1225842", url: "https://bugzilla.suse.com/1225842", }, { category: "self", summary: "SUSE CVE CVE-2020-36788 page", url: "https://www.suse.com/security/cve/CVE-2020-36788/", }, { category: "self", summary: "SUSE CVE CVE-2021-39698 page", url: "https://www.suse.com/security/cve/CVE-2021-39698/", }, { category: "self", summary: "SUSE CVE CVE-2021-4148 page", url: "https://www.suse.com/security/cve/CVE-2021-4148/", }, { category: "self", summary: "SUSE CVE CVE-2021-42327 page", url: "https://www.suse.com/security/cve/CVE-2021-42327/", }, { category: "self", summary: "SUSE CVE CVE-2021-43056 page", url: "https://www.suse.com/security/cve/CVE-2021-43056/", }, { category: "self", summary: "SUSE CVE CVE-2021-43527 page", url: "https://www.suse.com/security/cve/CVE-2021-43527/", }, { category: "self", summary: "SUSE CVE CVE-2021-47200 page", url: "https://www.suse.com/security/cve/CVE-2021-47200/", }, { category: "self", summary: "SUSE CVE CVE-2021-47358 page", url: "https://www.suse.com/security/cve/CVE-2021-47358/", }, { category: "self", summary: "SUSE CVE CVE-2021-47359 page", url: "https://www.suse.com/security/cve/CVE-2021-47359/", }, { category: "self", summary: "SUSE CVE CVE-2021-47360 page", url: "https://www.suse.com/security/cve/CVE-2021-47360/", }, { category: "self", summary: "SUSE CVE CVE-2021-47361 page", url: "https://www.suse.com/security/cve/CVE-2021-47361/", }, { category: "self", summary: "SUSE CVE CVE-2021-47362 page", url: "https://www.suse.com/security/cve/CVE-2021-47362/", }, { category: "self", summary: "SUSE CVE CVE-2021-47363 page", url: "https://www.suse.com/security/cve/CVE-2021-47363/", }, { category: "self", summary: "SUSE CVE CVE-2021-47364 page", url: "https://www.suse.com/security/cve/CVE-2021-47364/", }, { category: "self", summary: "SUSE CVE CVE-2021-47365 page", url: "https://www.suse.com/security/cve/CVE-2021-47365/", }, { category: "self", summary: "SUSE CVE CVE-2021-47366 page", url: "https://www.suse.com/security/cve/CVE-2021-47366/", }, { category: "self", summary: "SUSE CVE CVE-2021-47367 page", url: "https://www.suse.com/security/cve/CVE-2021-47367/", }, { category: "self", summary: "SUSE CVE CVE-2021-47368 page", url: "https://www.suse.com/security/cve/CVE-2021-47368/", }, { category: "self", summary: "SUSE CVE CVE-2021-47369 page", url: "https://www.suse.com/security/cve/CVE-2021-47369/", }, { category: "self", summary: "SUSE CVE CVE-2021-47370 page", url: "https://www.suse.com/security/cve/CVE-2021-47370/", }, { category: "self", summary: "SUSE CVE CVE-2021-47371 page", url: "https://www.suse.com/security/cve/CVE-2021-47371/", }, { category: "self", summary: "SUSE CVE CVE-2021-47372 page", url: "https://www.suse.com/security/cve/CVE-2021-47372/", }, { category: "self", summary: "SUSE CVE CVE-2021-47373 page", url: "https://www.suse.com/security/cve/CVE-2021-47373/", }, { category: "self", summary: "SUSE CVE CVE-2021-47374 page", url: "https://www.suse.com/security/cve/CVE-2021-47374/", }, { category: "self", summary: "SUSE CVE CVE-2021-47375 page", url: "https://www.suse.com/security/cve/CVE-2021-47375/", }, { category: "self", summary: "SUSE CVE CVE-2021-47376 page", url: "https://www.suse.com/security/cve/CVE-2021-47376/", }, { category: "self", summary: "SUSE CVE CVE-2021-47378 page", url: "https://www.suse.com/security/cve/CVE-2021-47378/", }, { category: "self", summary: "SUSE CVE CVE-2021-47379 page", url: "https://www.suse.com/security/cve/CVE-2021-47379/", }, { category: "self", summary: "SUSE CVE CVE-2021-47380 page", url: "https://www.suse.com/security/cve/CVE-2021-47380/", }, { category: "self", summary: "SUSE CVE CVE-2021-47381 page", url: "https://www.suse.com/security/cve/CVE-2021-47381/", }, { category: "self", summary: "SUSE CVE CVE-2021-47382 page", url: "https://www.suse.com/security/cve/CVE-2021-47382/", }, { category: "self", summary: "SUSE CVE CVE-2021-47383 page", url: "https://www.suse.com/security/cve/CVE-2021-47383/", }, { category: "self", summary: "SUSE CVE CVE-2021-47384 page", url: "https://www.suse.com/security/cve/CVE-2021-47384/", }, { category: "self", summary: "SUSE CVE CVE-2021-47385 page", url: "https://www.suse.com/security/cve/CVE-2021-47385/", }, { category: "self", summary: "SUSE CVE CVE-2021-47386 page", url: "https://www.suse.com/security/cve/CVE-2021-47386/", }, { category: "self", summary: "SUSE CVE CVE-2021-47387 page", url: "https://www.suse.com/security/cve/CVE-2021-47387/", }, { category: "self", summary: "SUSE CVE CVE-2021-47388 page", url: "https://www.suse.com/security/cve/CVE-2021-47388/", }, { category: "self", summary: "SUSE CVE CVE-2021-47389 page", url: "https://www.suse.com/security/cve/CVE-2021-47389/", }, { category: "self", summary: "SUSE CVE CVE-2021-47390 page", url: "https://www.suse.com/security/cve/CVE-2021-47390/", }, { category: "self", summary: "SUSE CVE CVE-2021-47391 page", url: "https://www.suse.com/security/cve/CVE-2021-47391/", }, { category: "self", summary: "SUSE CVE CVE-2021-47392 page", url: "https://www.suse.com/security/cve/CVE-2021-47392/", }, { category: "self", summary: "SUSE CVE CVE-2021-47393 page", url: "https://www.suse.com/security/cve/CVE-2021-47393/", }, { category: "self", summary: "SUSE CVE CVE-2021-47394 page", url: "https://www.suse.com/security/cve/CVE-2021-47394/", }, { category: "self", summary: "SUSE CVE CVE-2021-47395 page", url: "https://www.suse.com/security/cve/CVE-2021-47395/", }, { category: "self", summary: "SUSE CVE CVE-2021-47396 page", url: "https://www.suse.com/security/cve/CVE-2021-47396/", }, { category: "self", summary: "SUSE CVE CVE-2021-47397 page", url: "https://www.suse.com/security/cve/CVE-2021-47397/", }, { category: "self", summary: "SUSE CVE CVE-2021-47398 page", url: "https://www.suse.com/security/cve/CVE-2021-47398/", }, { category: "self", summary: "SUSE CVE CVE-2021-47399 page", url: "https://www.suse.com/security/cve/CVE-2021-47399/", }, { category: "self", summary: "SUSE CVE CVE-2021-47400 page", url: "https://www.suse.com/security/cve/CVE-2021-47400/", }, { category: "self", summary: "SUSE CVE CVE-2021-47401 page", url: "https://www.suse.com/security/cve/CVE-2021-47401/", }, { category: "self", summary: "SUSE CVE CVE-2021-47402 page", url: "https://www.suse.com/security/cve/CVE-2021-47402/", }, { category: "self", summary: "SUSE CVE CVE-2021-47403 page", url: "https://www.suse.com/security/cve/CVE-2021-47403/", }, { category: "self", summary: "SUSE CVE CVE-2021-47404 page", url: "https://www.suse.com/security/cve/CVE-2021-47404/", }, { category: "self", summary: "SUSE CVE CVE-2021-47405 page", url: "https://www.suse.com/security/cve/CVE-2021-47405/", }, { category: "self", summary: "SUSE CVE CVE-2021-47406 page", url: "https://www.suse.com/security/cve/CVE-2021-47406/", }, { category: "self", summary: "SUSE CVE CVE-2021-47407 page", url: "https://www.suse.com/security/cve/CVE-2021-47407/", }, { category: "self", summary: "SUSE CVE CVE-2021-47408 page", url: "https://www.suse.com/security/cve/CVE-2021-47408/", }, { category: "self", summary: "SUSE CVE CVE-2021-47409 page", url: "https://www.suse.com/security/cve/CVE-2021-47409/", }, { category: "self", summary: "SUSE CVE CVE-2021-47410 page", url: "https://www.suse.com/security/cve/CVE-2021-47410/", }, { category: "self", summary: "SUSE CVE CVE-2021-47412 page", url: "https://www.suse.com/security/cve/CVE-2021-47412/", }, { category: "self", summary: "SUSE CVE CVE-2021-47413 page", url: "https://www.suse.com/security/cve/CVE-2021-47413/", }, { category: "self", summary: "SUSE CVE CVE-2021-47414 page", url: "https://www.suse.com/security/cve/CVE-2021-47414/", }, { category: "self", summary: "SUSE CVE CVE-2021-47415 page", url: "https://www.suse.com/security/cve/CVE-2021-47415/", }, { category: "self", summary: "SUSE CVE CVE-2021-47416 page", url: "https://www.suse.com/security/cve/CVE-2021-47416/", }, { category: "self", summary: "SUSE CVE CVE-2021-47417 page", url: "https://www.suse.com/security/cve/CVE-2021-47417/", }, { category: "self", summary: "SUSE CVE CVE-2021-47418 page", url: "https://www.suse.com/security/cve/CVE-2021-47418/", }, { category: "self", summary: "SUSE CVE CVE-2021-47419 page", url: "https://www.suse.com/security/cve/CVE-2021-47419/", }, { category: "self", summary: "SUSE CVE CVE-2021-47420 page", url: "https://www.suse.com/security/cve/CVE-2021-47420/", }, { category: "self", summary: "SUSE CVE CVE-2021-47421 page", url: "https://www.suse.com/security/cve/CVE-2021-47421/", }, { category: "self", summary: "SUSE CVE CVE-2021-47422 page", url: "https://www.suse.com/security/cve/CVE-2021-47422/", }, { category: "self", summary: "SUSE CVE CVE-2021-47423 page", url: "https://www.suse.com/security/cve/CVE-2021-47423/", }, { category: "self", summary: "SUSE CVE CVE-2021-47424 page", url: "https://www.suse.com/security/cve/CVE-2021-47424/", }, { category: "self", summary: "SUSE CVE CVE-2021-47425 page", url: "https://www.suse.com/security/cve/CVE-2021-47425/", }, { category: "self", summary: "SUSE CVE CVE-2021-47426 page", url: "https://www.suse.com/security/cve/CVE-2021-47426/", }, { category: "self", summary: "SUSE CVE CVE-2021-47427 page", url: "https://www.suse.com/security/cve/CVE-2021-47427/", }, { category: "self", summary: "SUSE CVE CVE-2021-47428 page", url: "https://www.suse.com/security/cve/CVE-2021-47428/", }, { category: "self", summary: "SUSE CVE CVE-2021-47429 page", url: "https://www.suse.com/security/cve/CVE-2021-47429/", }, { category: "self", summary: "SUSE CVE CVE-2021-47430 page", url: "https://www.suse.com/security/cve/CVE-2021-47430/", }, { category: "self", summary: "SUSE CVE CVE-2021-47431 page", url: "https://www.suse.com/security/cve/CVE-2021-47431/", }, { category: "self", summary: "SUSE CVE CVE-2021-47433 page", url: "https://www.suse.com/security/cve/CVE-2021-47433/", }, { category: "self", summary: "SUSE CVE CVE-2021-47434 page", url: "https://www.suse.com/security/cve/CVE-2021-47434/", }, { category: "self", summary: "SUSE CVE CVE-2021-47435 page", url: "https://www.suse.com/security/cve/CVE-2021-47435/", }, { category: "self", summary: "SUSE CVE CVE-2021-47436 page", url: "https://www.suse.com/security/cve/CVE-2021-47436/", }, { category: "self", summary: "SUSE CVE CVE-2021-47437 page", url: "https://www.suse.com/security/cve/CVE-2021-47437/", }, { category: "self", summary: "SUSE CVE CVE-2021-47438 page", url: "https://www.suse.com/security/cve/CVE-2021-47438/", }, { category: "self", summary: "SUSE CVE CVE-2021-47439 page", url: "https://www.suse.com/security/cve/CVE-2021-47439/", }, { category: "self", summary: "SUSE CVE CVE-2021-47440 page", url: "https://www.suse.com/security/cve/CVE-2021-47440/", }, { category: "self", summary: "SUSE CVE CVE-2021-47441 page", url: "https://www.suse.com/security/cve/CVE-2021-47441/", }, { category: "self", summary: "SUSE CVE CVE-2021-47442 page", url: "https://www.suse.com/security/cve/CVE-2021-47442/", }, { category: "self", summary: "SUSE CVE CVE-2021-47443 page", url: "https://www.suse.com/security/cve/CVE-2021-47443/", }, { category: "self", summary: "SUSE CVE CVE-2021-47444 page", url: "https://www.suse.com/security/cve/CVE-2021-47444/", }, { category: "self", summary: "SUSE CVE CVE-2021-47445 page", url: "https://www.suse.com/security/cve/CVE-2021-47445/", }, { category: "self", summary: "SUSE CVE CVE-2021-47446 page", url: "https://www.suse.com/security/cve/CVE-2021-47446/", }, { category: "self", summary: "SUSE CVE CVE-2021-47447 page", url: "https://www.suse.com/security/cve/CVE-2021-47447/", }, { category: "self", summary: "SUSE CVE CVE-2021-47448 page", url: "https://www.suse.com/security/cve/CVE-2021-47448/", }, { category: "self", summary: "SUSE CVE CVE-2021-47449 page", url: "https://www.suse.com/security/cve/CVE-2021-47449/", }, { category: "self", summary: "SUSE CVE CVE-2021-47450 page", url: "https://www.suse.com/security/cve/CVE-2021-47450/", }, { category: "self", summary: "SUSE CVE CVE-2021-47451 page", url: "https://www.suse.com/security/cve/CVE-2021-47451/", }, { category: "self", summary: "SUSE CVE CVE-2021-47452 page", url: "https://www.suse.com/security/cve/CVE-2021-47452/", }, { category: "self", summary: "SUSE CVE CVE-2021-47453 page", url: "https://www.suse.com/security/cve/CVE-2021-47453/", }, { category: "self", summary: "SUSE CVE CVE-2021-47454 page", url: "https://www.suse.com/security/cve/CVE-2021-47454/", }, { category: "self", summary: "SUSE CVE CVE-2021-47455 page", url: "https://www.suse.com/security/cve/CVE-2021-47455/", }, { category: "self", summary: "SUSE CVE CVE-2021-47456 page", url: "https://www.suse.com/security/cve/CVE-2021-47456/", }, { category: "self", summary: "SUSE CVE CVE-2021-47457 page", url: "https://www.suse.com/security/cve/CVE-2021-47457/", }, { category: "self", summary: "SUSE CVE CVE-2021-47458 page", url: "https://www.suse.com/security/cve/CVE-2021-47458/", }, { category: "self", summary: "SUSE CVE CVE-2021-47459 page", url: "https://www.suse.com/security/cve/CVE-2021-47459/", }, { category: "self", summary: "SUSE CVE CVE-2021-47460 page", url: "https://www.suse.com/security/cve/CVE-2021-47460/", }, { category: "self", summary: "SUSE CVE CVE-2021-47461 page", url: "https://www.suse.com/security/cve/CVE-2021-47461/", }, { category: "self", summary: "SUSE CVE CVE-2021-47462 page", url: "https://www.suse.com/security/cve/CVE-2021-47462/", }, { category: "self", summary: "SUSE CVE CVE-2021-47463 page", url: "https://www.suse.com/security/cve/CVE-2021-47463/", }, { category: "self", summary: "SUSE CVE CVE-2021-47464 page", url: "https://www.suse.com/security/cve/CVE-2021-47464/", }, { category: "self", summary: "SUSE CVE CVE-2021-47465 page", url: "https://www.suse.com/security/cve/CVE-2021-47465/", }, { category: "self", summary: "SUSE CVE CVE-2021-47466 page", url: "https://www.suse.com/security/cve/CVE-2021-47466/", }, { category: "self", summary: "SUSE CVE CVE-2021-47467 page", url: "https://www.suse.com/security/cve/CVE-2021-47467/", }, { category: "self", summary: "SUSE CVE CVE-2021-47468 page", url: "https://www.suse.com/security/cve/CVE-2021-47468/", }, { category: "self", summary: "SUSE CVE CVE-2021-47469 page", url: "https://www.suse.com/security/cve/CVE-2021-47469/", }, { category: "self", summary: "SUSE CVE CVE-2021-47470 page", url: "https://www.suse.com/security/cve/CVE-2021-47470/", }, { category: "self", summary: "SUSE CVE CVE-2021-47471 page", url: "https://www.suse.com/security/cve/CVE-2021-47471/", }, { category: "self", summary: "SUSE CVE CVE-2021-47472 page", url: "https://www.suse.com/security/cve/CVE-2021-47472/", }, { category: "self", summary: "SUSE CVE CVE-2021-47473 page", url: "https://www.suse.com/security/cve/CVE-2021-47473/", }, { category: "self", summary: "SUSE CVE CVE-2021-47474 page", url: "https://www.suse.com/security/cve/CVE-2021-47474/", }, { category: "self", summary: "SUSE CVE CVE-2021-47475 page", url: "https://www.suse.com/security/cve/CVE-2021-47475/", }, { category: "self", summary: "SUSE CVE CVE-2021-47476 page", url: "https://www.suse.com/security/cve/CVE-2021-47476/", }, { category: "self", summary: "SUSE CVE CVE-2021-47477 page", url: "https://www.suse.com/security/cve/CVE-2021-47477/", }, { category: "self", summary: "SUSE CVE CVE-2021-47478 page", url: "https://www.suse.com/security/cve/CVE-2021-47478/", }, { category: "self", summary: "SUSE CVE CVE-2021-47479 page", url: "https://www.suse.com/security/cve/CVE-2021-47479/", }, { category: "self", summary: "SUSE CVE CVE-2021-47480 page", url: "https://www.suse.com/security/cve/CVE-2021-47480/", }, { category: "self", summary: "SUSE CVE CVE-2021-47481 page", url: "https://www.suse.com/security/cve/CVE-2021-47481/", }, { category: "self", summary: "SUSE CVE CVE-2021-47482 page", url: "https://www.suse.com/security/cve/CVE-2021-47482/", }, { category: "self", summary: "SUSE CVE CVE-2021-47483 page", url: "https://www.suse.com/security/cve/CVE-2021-47483/", }, { category: "self", summary: "SUSE CVE CVE-2021-47484 page", url: "https://www.suse.com/security/cve/CVE-2021-47484/", }, { category: "self", summary: "SUSE CVE CVE-2021-47485 page", url: "https://www.suse.com/security/cve/CVE-2021-47485/", }, { category: "self", summary: "SUSE CVE CVE-2021-47486 page", url: "https://www.suse.com/security/cve/CVE-2021-47486/", }, { category: "self", summary: "SUSE CVE CVE-2021-47488 page", url: "https://www.suse.com/security/cve/CVE-2021-47488/", }, { category: "self", summary: "SUSE CVE CVE-2021-47489 page", url: "https://www.suse.com/security/cve/CVE-2021-47489/", }, { category: "self", summary: "SUSE CVE CVE-2021-47490 page", url: "https://www.suse.com/security/cve/CVE-2021-47490/", }, { category: "self", summary: "SUSE CVE CVE-2021-47491 page", url: "https://www.suse.com/security/cve/CVE-2021-47491/", }, { category: "self", summary: "SUSE CVE CVE-2021-47492 page", url: "https://www.suse.com/security/cve/CVE-2021-47492/", }, { category: "self", summary: "SUSE CVE CVE-2021-47493 page", url: "https://www.suse.com/security/cve/CVE-2021-47493/", }, { category: "self", summary: "SUSE CVE CVE-2021-47494 page", url: "https://www.suse.com/security/cve/CVE-2021-47494/", }, { category: "self", summary: "SUSE CVE CVE-2021-47495 page", url: "https://www.suse.com/security/cve/CVE-2021-47495/", }, { category: "self", summary: "SUSE CVE CVE-2021-47496 page", url: "https://www.suse.com/security/cve/CVE-2021-47496/", }, { category: "self", summary: "SUSE CVE CVE-2021-47497 page", url: "https://www.suse.com/security/cve/CVE-2021-47497/", }, { category: "self", summary: "SUSE CVE CVE-2021-47498 page", url: "https://www.suse.com/security/cve/CVE-2021-47498/", }, { category: "self", summary: "SUSE CVE CVE-2021-47499 page", url: "https://www.suse.com/security/cve/CVE-2021-47499/", }, { category: "self", summary: "SUSE CVE CVE-2021-47500 page", url: "https://www.suse.com/security/cve/CVE-2021-47500/", }, { category: "self", summary: "SUSE CVE CVE-2021-47501 page", url: "https://www.suse.com/security/cve/CVE-2021-47501/", }, { category: "self", summary: "SUSE CVE CVE-2021-47502 page", url: "https://www.suse.com/security/cve/CVE-2021-47502/", }, { category: "self", summary: "SUSE CVE CVE-2021-47503 page", url: "https://www.suse.com/security/cve/CVE-2021-47503/", }, { category: "self", summary: "SUSE CVE CVE-2021-47504 page", url: "https://www.suse.com/security/cve/CVE-2021-47504/", }, { category: "self", summary: "SUSE CVE CVE-2021-47505 page", url: "https://www.suse.com/security/cve/CVE-2021-47505/", }, { category: "self", summary: "SUSE CVE CVE-2021-47506 page", url: "https://www.suse.com/security/cve/CVE-2021-47506/", }, { category: "self", summary: "SUSE CVE CVE-2021-47507 page", url: "https://www.suse.com/security/cve/CVE-2021-47507/", }, { category: "self", summary: "SUSE CVE CVE-2021-47508 page", url: "https://www.suse.com/security/cve/CVE-2021-47508/", }, { category: "self", summary: "SUSE CVE CVE-2021-47509 page", url: "https://www.suse.com/security/cve/CVE-2021-47509/", }, { category: "self", summary: "SUSE CVE CVE-2021-47510 page", url: "https://www.suse.com/security/cve/CVE-2021-47510/", }, { category: "self", summary: "SUSE CVE CVE-2021-47511 page", url: "https://www.suse.com/security/cve/CVE-2021-47511/", }, { category: "self", summary: "SUSE CVE CVE-2021-47512 page", url: "https://www.suse.com/security/cve/CVE-2021-47512/", }, { category: "self", summary: "SUSE CVE CVE-2021-47513 page", url: "https://www.suse.com/security/cve/CVE-2021-47513/", }, { category: "self", summary: "SUSE CVE CVE-2021-47514 page", url: "https://www.suse.com/security/cve/CVE-2021-47514/", }, { category: "self", summary: "SUSE CVE CVE-2021-47516 page", url: "https://www.suse.com/security/cve/CVE-2021-47516/", }, { category: "self", summary: "SUSE CVE CVE-2021-47518 page", url: "https://www.suse.com/security/cve/CVE-2021-47518/", }, { category: "self", summary: "SUSE CVE CVE-2021-47520 page", url: "https://www.suse.com/security/cve/CVE-2021-47520/", }, { category: "self", summary: "SUSE CVE CVE-2021-47521 page", url: "https://www.suse.com/security/cve/CVE-2021-47521/", }, { category: "self", summary: "SUSE CVE CVE-2021-47522 page", url: "https://www.suse.com/security/cve/CVE-2021-47522/", }, { category: "self", summary: "SUSE CVE CVE-2021-47523 page", url: "https://www.suse.com/security/cve/CVE-2021-47523/", }, { category: "self", summary: "SUSE CVE CVE-2021-47524 page", url: "https://www.suse.com/security/cve/CVE-2021-47524/", }, { category: "self", summary: "SUSE CVE CVE-2021-47525 page", url: "https://www.suse.com/security/cve/CVE-2021-47525/", }, { category: "self", summary: "SUSE CVE CVE-2021-47526 page", url: "https://www.suse.com/security/cve/CVE-2021-47526/", }, { category: "self", summary: "SUSE CVE CVE-2021-47528 page", url: "https://www.suse.com/security/cve/CVE-2021-47528/", }, { category: "self", summary: "SUSE CVE CVE-2021-47529 page", url: "https://www.suse.com/security/cve/CVE-2021-47529/", }, { category: "self", summary: "SUSE CVE CVE-2021-47530 page", url: "https://www.suse.com/security/cve/CVE-2021-47530/", }, { category: "self", summary: "SUSE CVE CVE-2021-47531 page", url: "https://www.suse.com/security/cve/CVE-2021-47531/", }, { category: "self", summary: "SUSE CVE CVE-2021-47532 page", url: "https://www.suse.com/security/cve/CVE-2021-47532/", }, { category: "self", summary: "SUSE CVE CVE-2021-47533 page", url: "https://www.suse.com/security/cve/CVE-2021-47533/", }, { category: "self", summary: "SUSE CVE CVE-2021-47534 page", url: "https://www.suse.com/security/cve/CVE-2021-47534/", }, { category: "self", summary: "SUSE CVE CVE-2021-47535 page", url: "https://www.suse.com/security/cve/CVE-2021-47535/", }, { category: "self", summary: "SUSE CVE CVE-2021-47536 page", url: "https://www.suse.com/security/cve/CVE-2021-47536/", }, { category: "self", summary: "SUSE CVE CVE-2021-47537 page", url: "https://www.suse.com/security/cve/CVE-2021-47537/", }, { category: "self", summary: "SUSE CVE CVE-2021-47540 page", url: "https://www.suse.com/security/cve/CVE-2021-47540/", }, { category: "self", summary: "SUSE CVE CVE-2021-47541 page", url: "https://www.suse.com/security/cve/CVE-2021-47541/", }, { category: "self", summary: "SUSE CVE CVE-2021-47542 page", url: "https://www.suse.com/security/cve/CVE-2021-47542/", }, { category: "self", summary: "SUSE CVE CVE-2021-47544 page", url: "https://www.suse.com/security/cve/CVE-2021-47544/", }, { category: "self", summary: "SUSE CVE CVE-2021-47548 page", url: "https://www.suse.com/security/cve/CVE-2021-47548/", }, { category: "self", summary: "SUSE CVE CVE-2021-47549 page", url: "https://www.suse.com/security/cve/CVE-2021-47549/", }, { category: "self", summary: "SUSE CVE CVE-2021-47550 page", url: "https://www.suse.com/security/cve/CVE-2021-47550/", }, { category: "self", summary: "SUSE CVE CVE-2021-47551 page", url: "https://www.suse.com/security/cve/CVE-2021-47551/", }, { category: "self", summary: "SUSE CVE CVE-2021-47552 page", url: "https://www.suse.com/security/cve/CVE-2021-47552/", }, { category: "self", summary: "SUSE CVE CVE-2021-47553 page", url: "https://www.suse.com/security/cve/CVE-2021-47553/", }, { category: "self", summary: "SUSE CVE CVE-2021-47554 page", url: "https://www.suse.com/security/cve/CVE-2021-47554/", }, { category: "self", summary: "SUSE CVE CVE-2021-47555 page", url: "https://www.suse.com/security/cve/CVE-2021-47555/", }, { category: "self", summary: "SUSE CVE CVE-2021-47556 page", url: "https://www.suse.com/security/cve/CVE-2021-47556/", }, { category: "self", summary: "SUSE CVE CVE-2021-47557 page", url: "https://www.suse.com/security/cve/CVE-2021-47557/", }, { category: "self", summary: "SUSE CVE CVE-2021-47558 page", url: "https://www.suse.com/security/cve/CVE-2021-47558/", }, { category: "self", summary: "SUSE CVE CVE-2021-47559 page", url: "https://www.suse.com/security/cve/CVE-2021-47559/", }, { category: "self", summary: "SUSE CVE CVE-2021-47560 page", url: "https://www.suse.com/security/cve/CVE-2021-47560/", }, { category: "self", summary: "SUSE CVE CVE-2021-47562 page", url: "https://www.suse.com/security/cve/CVE-2021-47562/", }, { category: "self", summary: "SUSE CVE CVE-2021-47563 page", url: "https://www.suse.com/security/cve/CVE-2021-47563/", }, { category: "self", summary: "SUSE CVE CVE-2021-47564 page", url: "https://www.suse.com/security/cve/CVE-2021-47564/", }, { category: "self", summary: "SUSE CVE CVE-2021-47565 page", url: "https://www.suse.com/security/cve/CVE-2021-47565/", }, { category: "self", summary: "SUSE CVE CVE-2021-47569 page", url: "https://www.suse.com/security/cve/CVE-2021-47569/", }, { category: "self", summary: "SUSE CVE CVE-2022-48633 page", url: "https://www.suse.com/security/cve/CVE-2022-48633/", }, { category: "self", summary: "SUSE CVE CVE-2022-48662 page", url: "https://www.suse.com/security/cve/CVE-2022-48662/", }, { category: "self", summary: "SUSE CVE CVE-2022-48669 page", url: "https://www.suse.com/security/cve/CVE-2022-48669/", }, { category: "self", summary: "SUSE CVE CVE-2022-48689 page", url: "https://www.suse.com/security/cve/CVE-2022-48689/", }, { category: "self", summary: "SUSE CVE CVE-2022-48691 page", url: "https://www.suse.com/security/cve/CVE-2022-48691/", }, { category: "self", summary: "SUSE CVE CVE-2022-48699 page", url: "https://www.suse.com/security/cve/CVE-2022-48699/", }, { category: "self", summary: "SUSE CVE CVE-2022-48705 page", url: "https://www.suse.com/security/cve/CVE-2022-48705/", }, { category: "self", summary: "SUSE CVE CVE-2022-48708 page", url: "https://www.suse.com/security/cve/CVE-2022-48708/", }, { category: "self", summary: "SUSE CVE CVE-2022-48709 page", url: "https://www.suse.com/security/cve/CVE-2022-48709/", }, { category: "self", summary: "SUSE CVE CVE-2022-48710 page", url: "https://www.suse.com/security/cve/CVE-2022-48710/", }, { category: "self", summary: "SUSE CVE CVE-2023-0160 page", url: "https://www.suse.com/security/cve/CVE-2023-0160/", }, { category: "self", summary: "SUSE CVE CVE-2023-1829 page", url: "https://www.suse.com/security/cve/CVE-2023-1829/", }, { category: "self", summary: "SUSE CVE CVE-2023-42755 page", url: "https://www.suse.com/security/cve/CVE-2023-42755/", }, { category: "self", summary: "SUSE CVE CVE-2023-47233 page", url: "https://www.suse.com/security/cve/CVE-2023-47233/", }, { category: "self", summary: "SUSE CVE CVE-2023-52586 page", url: "https://www.suse.com/security/cve/CVE-2023-52586/", }, { category: "self", summary: "SUSE CVE CVE-2023-52591 page", url: "https://www.suse.com/security/cve/CVE-2023-52591/", }, { category: "self", summary: "SUSE CVE CVE-2023-52618 page", url: "https://www.suse.com/security/cve/CVE-2023-52618/", }, { category: "self", summary: "SUSE CVE CVE-2023-52642 page", url: "https://www.suse.com/security/cve/CVE-2023-52642/", }, { category: "self", summary: "SUSE CVE CVE-2023-52643 page", url: "https://www.suse.com/security/cve/CVE-2023-52643/", }, { category: "self", summary: "SUSE CVE CVE-2023-52644 page", url: "https://www.suse.com/security/cve/CVE-2023-52644/", }, { category: "self", summary: "SUSE CVE CVE-2023-52646 page", url: "https://www.suse.com/security/cve/CVE-2023-52646/", }, { category: "self", summary: "SUSE CVE CVE-2023-52650 page", url: "https://www.suse.com/security/cve/CVE-2023-52650/", }, { category: "self", summary: "SUSE CVE CVE-2023-52653 page", url: "https://www.suse.com/security/cve/CVE-2023-52653/", }, { category: "self", summary: "SUSE CVE CVE-2023-52654 page", url: "https://www.suse.com/security/cve/CVE-2023-52654/", }, { category: "self", summary: "SUSE CVE CVE-2023-52655 page", url: "https://www.suse.com/security/cve/CVE-2023-52655/", }, { category: "self", summary: "SUSE CVE CVE-2023-52656 page", url: "https://www.suse.com/security/cve/CVE-2023-52656/", }, { category: "self", summary: "SUSE CVE CVE-2023-52657 page", url: "https://www.suse.com/security/cve/CVE-2023-52657/", }, { category: "self", summary: "SUSE CVE CVE-2023-52659 page", url: "https://www.suse.com/security/cve/CVE-2023-52659/", }, { category: "self", summary: "SUSE CVE CVE-2023-52660 page", url: "https://www.suse.com/security/cve/CVE-2023-52660/", }, { category: "self", summary: "SUSE CVE CVE-2023-52661 page", url: "https://www.suse.com/security/cve/CVE-2023-52661/", }, { category: "self", summary: "SUSE CVE CVE-2023-52662 page", url: "https://www.suse.com/security/cve/CVE-2023-52662/", }, { category: "self", summary: "SUSE CVE CVE-2023-52664 page", url: "https://www.suse.com/security/cve/CVE-2023-52664/", }, { category: "self", summary: "SUSE CVE CVE-2023-52669 page", url: "https://www.suse.com/security/cve/CVE-2023-52669/", }, { category: "self", summary: "SUSE CVE CVE-2023-52671 page", url: "https://www.suse.com/security/cve/CVE-2023-52671/", }, { category: "self", summary: "SUSE CVE CVE-2023-52674 page", url: "https://www.suse.com/security/cve/CVE-2023-52674/", }, { category: "self", summary: "SUSE CVE CVE-2023-52676 page", url: "https://www.suse.com/security/cve/CVE-2023-52676/", }, { category: "self", summary: "SUSE CVE CVE-2023-52678 page", url: "https://www.suse.com/security/cve/CVE-2023-52678/", }, { category: "self", summary: "SUSE CVE CVE-2023-52679 page", url: "https://www.suse.com/security/cve/CVE-2023-52679/", }, { category: "self", summary: "SUSE CVE CVE-2023-52680 page", url: "https://www.suse.com/security/cve/CVE-2023-52680/", }, { category: "self", summary: "SUSE CVE CVE-2023-52683 page", url: "https://www.suse.com/security/cve/CVE-2023-52683/", }, { category: "self", summary: "SUSE CVE CVE-2023-52685 page", url: "https://www.suse.com/security/cve/CVE-2023-52685/", }, { category: "self", summary: "SUSE CVE CVE-2023-52686 page", url: "https://www.suse.com/security/cve/CVE-2023-52686/", }, { category: "self", summary: "SUSE CVE CVE-2023-52690 page", url: "https://www.suse.com/security/cve/CVE-2023-52690/", }, { category: "self", summary: "SUSE CVE CVE-2023-52691 page", url: "https://www.suse.com/security/cve/CVE-2023-52691/", }, { category: "self", summary: "SUSE CVE CVE-2023-52692 page", url: "https://www.suse.com/security/cve/CVE-2023-52692/", }, { category: "self", summary: "SUSE CVE CVE-2023-52693 page", url: "https://www.suse.com/security/cve/CVE-2023-52693/", }, { category: "self", summary: "SUSE CVE CVE-2023-52694 page", url: "https://www.suse.com/security/cve/CVE-2023-52694/", }, { category: "self", summary: "SUSE CVE CVE-2023-52696 page", url: "https://www.suse.com/security/cve/CVE-2023-52696/", }, { category: "self", summary: "SUSE CVE CVE-2023-52698 page", url: "https://www.suse.com/security/cve/CVE-2023-52698/", }, { category: "self", summary: "SUSE CVE CVE-2023-52699 page", url: "https://www.suse.com/security/cve/CVE-2023-52699/", }, { category: "self", summary: "SUSE CVE CVE-2023-52702 page", url: "https://www.suse.com/security/cve/CVE-2023-52702/", }, { category: "self", summary: "SUSE CVE CVE-2023-52703 page", url: "https://www.suse.com/security/cve/CVE-2023-52703/", }, { category: "self", summary: "SUSE CVE CVE-2023-52705 page", url: "https://www.suse.com/security/cve/CVE-2023-52705/", }, { category: "self", summary: "SUSE CVE CVE-2023-52707 page", url: "https://www.suse.com/security/cve/CVE-2023-52707/", }, { category: "self", summary: "SUSE CVE CVE-2023-52708 page", url: "https://www.suse.com/security/cve/CVE-2023-52708/", }, { category: "self", summary: "SUSE CVE CVE-2023-52730 page", url: "https://www.suse.com/security/cve/CVE-2023-52730/", }, { category: "self", summary: "SUSE CVE CVE-2023-52731 page", url: "https://www.suse.com/security/cve/CVE-2023-52731/", }, { category: "self", summary: "SUSE CVE CVE-2023-52732 page", url: "https://www.suse.com/security/cve/CVE-2023-52732/", }, { category: "self", summary: "SUSE CVE CVE-2023-52733 page", url: "https://www.suse.com/security/cve/CVE-2023-52733/", }, { category: "self", summary: "SUSE CVE CVE-2023-52736 page", url: "https://www.suse.com/security/cve/CVE-2023-52736/", }, { category: "self", summary: "SUSE CVE CVE-2023-52738 page", url: "https://www.suse.com/security/cve/CVE-2023-52738/", }, { category: "self", summary: "SUSE CVE CVE-2023-52739 page", url: "https://www.suse.com/security/cve/CVE-2023-52739/", }, { category: "self", summary: "SUSE CVE CVE-2023-52740 page", url: "https://www.suse.com/security/cve/CVE-2023-52740/", }, { category: "self", summary: "SUSE CVE CVE-2023-52741 page", url: "https://www.suse.com/security/cve/CVE-2023-52741/", }, { category: "self", summary: "SUSE CVE CVE-2023-52742 page", url: "https://www.suse.com/security/cve/CVE-2023-52742/", }, { category: "self", summary: "SUSE CVE CVE-2023-52743 page", url: "https://www.suse.com/security/cve/CVE-2023-52743/", }, { category: "self", summary: "SUSE CVE CVE-2023-52744 page", url: "https://www.suse.com/security/cve/CVE-2023-52744/", }, { category: "self", summary: "SUSE CVE CVE-2023-52745 page", url: "https://www.suse.com/security/cve/CVE-2023-52745/", }, { category: "self", summary: "SUSE CVE CVE-2023-52746 page", url: "https://www.suse.com/security/cve/CVE-2023-52746/", }, { category: "self", summary: "SUSE CVE CVE-2023-52747 page", url: "https://www.suse.com/security/cve/CVE-2023-52747/", }, { category: "self", summary: "SUSE CVE CVE-2023-52753 page", url: "https://www.suse.com/security/cve/CVE-2023-52753/", }, { category: "self", summary: "SUSE CVE CVE-2023-52754 page", url: "https://www.suse.com/security/cve/CVE-2023-52754/", }, { category: "self", summary: "SUSE CVE CVE-2023-52756 page", url: "https://www.suse.com/security/cve/CVE-2023-52756/", }, { category: "self", summary: "SUSE CVE CVE-2023-52757 page", url: "https://www.suse.com/security/cve/CVE-2023-52757/", }, { category: "self", summary: "SUSE CVE CVE-2023-52759 page", url: "https://www.suse.com/security/cve/CVE-2023-52759/", }, { category: "self", summary: "SUSE CVE CVE-2023-52763 page", url: "https://www.suse.com/security/cve/CVE-2023-52763/", }, { category: "self", summary: "SUSE CVE CVE-2023-52764 page", url: "https://www.suse.com/security/cve/CVE-2023-52764/", }, { category: "self", summary: "SUSE CVE CVE-2023-52766 page", url: "https://www.suse.com/security/cve/CVE-2023-52766/", }, { category: "self", summary: "SUSE CVE CVE-2023-52773 page", url: "https://www.suse.com/security/cve/CVE-2023-52773/", }, { category: "self", summary: "SUSE CVE CVE-2023-52774 page", url: "https://www.suse.com/security/cve/CVE-2023-52774/", }, { category: "self", summary: "SUSE CVE CVE-2023-52777 page", url: "https://www.suse.com/security/cve/CVE-2023-52777/", }, { category: "self", summary: "SUSE CVE CVE-2023-52781 page", url: "https://www.suse.com/security/cve/CVE-2023-52781/", }, { category: "self", summary: "SUSE CVE CVE-2023-52788 page", url: "https://www.suse.com/security/cve/CVE-2023-52788/", }, { category: "self", summary: "SUSE CVE CVE-2023-52789 page", url: "https://www.suse.com/security/cve/CVE-2023-52789/", }, { category: "self", summary: "SUSE CVE CVE-2023-52791 page", url: "https://www.suse.com/security/cve/CVE-2023-52791/", }, { category: "self", summary: "SUSE CVE CVE-2023-52795 page", url: "https://www.suse.com/security/cve/CVE-2023-52795/", }, { category: "self", summary: "SUSE CVE CVE-2023-52796 page", url: "https://www.suse.com/security/cve/CVE-2023-52796/", }, { category: "self", summary: "SUSE CVE CVE-2023-52798 page", url: "https://www.suse.com/security/cve/CVE-2023-52798/", }, { category: "self", summary: "SUSE CVE CVE-2023-52799 page", url: "https://www.suse.com/security/cve/CVE-2023-52799/", }, { category: "self", summary: "SUSE CVE CVE-2023-52800 page", url: "https://www.suse.com/security/cve/CVE-2023-52800/", }, { category: "self", summary: "SUSE CVE CVE-2023-52803 page", url: "https://www.suse.com/security/cve/CVE-2023-52803/", }, { category: "self", summary: "SUSE CVE CVE-2023-52804 page", url: "https://www.suse.com/security/cve/CVE-2023-52804/", }, { category: "self", summary: "SUSE CVE CVE-2023-52805 page", url: "https://www.suse.com/security/cve/CVE-2023-52805/", }, { category: "self", summary: "SUSE CVE CVE-2023-52806 page", url: "https://www.suse.com/security/cve/CVE-2023-52806/", }, { category: "self", summary: "SUSE CVE CVE-2023-52807 page", url: "https://www.suse.com/security/cve/CVE-2023-52807/", }, { category: "self", summary: "SUSE CVE CVE-2023-52808 page", url: "https://www.suse.com/security/cve/CVE-2023-52808/", }, { category: "self", summary: "SUSE CVE CVE-2023-52809 page", url: "https://www.suse.com/security/cve/CVE-2023-52809/", }, { category: "self", summary: "SUSE CVE CVE-2023-52810 page", url: "https://www.suse.com/security/cve/CVE-2023-52810/", }, { category: "self", summary: "SUSE CVE CVE-2023-52811 page", url: "https://www.suse.com/security/cve/CVE-2023-52811/", }, { category: "self", summary: "SUSE CVE CVE-2023-52814 page", url: "https://www.suse.com/security/cve/CVE-2023-52814/", }, { category: "self", summary: "SUSE CVE CVE-2023-52815 page", url: "https://www.suse.com/security/cve/CVE-2023-52815/", }, { category: "self", summary: "SUSE CVE CVE-2023-52816 page", url: "https://www.suse.com/security/cve/CVE-2023-52816/", }, { category: "self", summary: "SUSE CVE CVE-2023-52817 page", url: "https://www.suse.com/security/cve/CVE-2023-52817/", }, { category: "self", summary: "SUSE CVE CVE-2023-52818 page", url: "https://www.suse.com/security/cve/CVE-2023-52818/", }, { category: "self", summary: "SUSE CVE CVE-2023-52819 page", url: "https://www.suse.com/security/cve/CVE-2023-52819/", }, { category: "self", summary: "SUSE CVE CVE-2023-52821 page", url: "https://www.suse.com/security/cve/CVE-2023-52821/", }, { category: "self", summary: "SUSE CVE CVE-2023-52825 page", url: "https://www.suse.com/security/cve/CVE-2023-52825/", }, { category: "self", summary: "SUSE CVE CVE-2023-52826 page", url: "https://www.suse.com/security/cve/CVE-2023-52826/", }, { category: "self", summary: "SUSE CVE CVE-2023-52832 page", url: "https://www.suse.com/security/cve/CVE-2023-52832/", }, { category: "self", summary: "SUSE CVE CVE-2023-52833 page", url: "https://www.suse.com/security/cve/CVE-2023-52833/", }, { category: "self", summary: "SUSE CVE CVE-2023-52834 page", url: "https://www.suse.com/security/cve/CVE-2023-52834/", }, { category: "self", summary: "SUSE CVE CVE-2023-52838 page", url: "https://www.suse.com/security/cve/CVE-2023-52838/", }, { category: "self", summary: "SUSE CVE CVE-2023-52840 page", url: "https://www.suse.com/security/cve/CVE-2023-52840/", }, { category: "self", summary: "SUSE CVE CVE-2023-52841 page", url: "https://www.suse.com/security/cve/CVE-2023-52841/", }, { category: "self", summary: "SUSE CVE CVE-2023-52844 page", url: "https://www.suse.com/security/cve/CVE-2023-52844/", }, { category: "self", summary: "SUSE CVE CVE-2023-52847 page", url: "https://www.suse.com/security/cve/CVE-2023-52847/", }, { category: "self", summary: "SUSE CVE CVE-2023-52851 page", url: "https://www.suse.com/security/cve/CVE-2023-52851/", }, { category: "self", summary: "SUSE CVE CVE-2023-52853 page", url: "https://www.suse.com/security/cve/CVE-2023-52853/", }, { category: "self", summary: "SUSE CVE CVE-2023-52854 page", url: "https://www.suse.com/security/cve/CVE-2023-52854/", }, { category: "self", summary: "SUSE CVE CVE-2023-52855 page", url: "https://www.suse.com/security/cve/CVE-2023-52855/", }, { category: "self", summary: "SUSE CVE CVE-2023-52856 page", url: "https://www.suse.com/security/cve/CVE-2023-52856/", }, { category: "self", summary: "SUSE CVE CVE-2023-52858 page", url: "https://www.suse.com/security/cve/CVE-2023-52858/", }, { category: "self", summary: "SUSE CVE CVE-2023-52860 page", url: "https://www.suse.com/security/cve/CVE-2023-52860/", }, { category: "self", summary: "SUSE CVE CVE-2023-52861 page", url: "https://www.suse.com/security/cve/CVE-2023-52861/", }, { category: "self", summary: "SUSE CVE CVE-2023-52864 page", url: "https://www.suse.com/security/cve/CVE-2023-52864/", }, { category: "self", summary: "SUSE CVE CVE-2023-52865 page", url: "https://www.suse.com/security/cve/CVE-2023-52865/", }, { category: "self", summary: "SUSE CVE CVE-2023-52867 page", url: "https://www.suse.com/security/cve/CVE-2023-52867/", }, { category: "self", summary: "SUSE CVE CVE-2023-52868 page", url: "https://www.suse.com/security/cve/CVE-2023-52868/", }, { category: "self", summary: "SUSE CVE CVE-2023-52870 page", url: "https://www.suse.com/security/cve/CVE-2023-52870/", }, { category: "self", summary: "SUSE CVE CVE-2023-52871 page", url: "https://www.suse.com/security/cve/CVE-2023-52871/", }, { category: "self", summary: "SUSE CVE CVE-2023-52872 page", url: "https://www.suse.com/security/cve/CVE-2023-52872/", }, { category: "self", summary: "SUSE CVE CVE-2023-52873 page", url: "https://www.suse.com/security/cve/CVE-2023-52873/", }, { category: "self", summary: "SUSE CVE CVE-2023-52875 page", url: "https://www.suse.com/security/cve/CVE-2023-52875/", }, { category: "self", summary: "SUSE CVE CVE-2023-52876 page", url: "https://www.suse.com/security/cve/CVE-2023-52876/", }, { category: "self", summary: "SUSE CVE CVE-2023-52877 page", url: "https://www.suse.com/security/cve/CVE-2023-52877/", }, { category: "self", summary: "SUSE CVE CVE-2023-52878 page", url: "https://www.suse.com/security/cve/CVE-2023-52878/", }, { category: "self", summary: "SUSE CVE CVE-2023-52880 page", url: "https://www.suse.com/security/cve/CVE-2023-52880/", }, { category: "self", summary: "SUSE CVE CVE-2023-6531 page", url: "https://www.suse.com/security/cve/CVE-2023-6531/", }, { category: "self", summary: "SUSE CVE CVE-2024-2201 page", url: "https://www.suse.com/security/cve/CVE-2024-2201/", }, { category: "self", summary: "SUSE CVE CVE-2024-26597 page", url: "https://www.suse.com/security/cve/CVE-2024-26597/", }, { category: "self", summary: "SUSE CVE CVE-2024-26643 page", url: "https://www.suse.com/security/cve/CVE-2024-26643/", }, { category: "self", summary: "SUSE CVE CVE-2024-26679 page", url: "https://www.suse.com/security/cve/CVE-2024-26679/", }, { category: "self", summary: "SUSE CVE CVE-2024-26692 page", url: "https://www.suse.com/security/cve/CVE-2024-26692/", }, { category: "self", summary: "SUSE CVE CVE-2024-26698 page", url: "https://www.suse.com/security/cve/CVE-2024-26698/", }, { category: "self", summary: "SUSE CVE CVE-2024-26700 page", url: "https://www.suse.com/security/cve/CVE-2024-26700/", }, { category: "self", summary: "SUSE CVE CVE-2024-26715 page", url: "https://www.suse.com/security/cve/CVE-2024-26715/", }, { category: "self", summary: "SUSE CVE CVE-2024-26739 page", url: "https://www.suse.com/security/cve/CVE-2024-26739/", }, { category: "self", summary: "SUSE CVE CVE-2024-26742 page", url: "https://www.suse.com/security/cve/CVE-2024-26742/", }, { category: "self", summary: "SUSE CVE CVE-2024-26748 page", url: "https://www.suse.com/security/cve/CVE-2024-26748/", }, { category: "self", summary: "SUSE CVE CVE-2024-26758 page", url: "https://www.suse.com/security/cve/CVE-2024-26758/", }, { category: "self", summary: "SUSE CVE CVE-2024-26764 page", url: "https://www.suse.com/security/cve/CVE-2024-26764/", }, { category: "self", summary: "SUSE CVE CVE-2024-26775 page", url: "https://www.suse.com/security/cve/CVE-2024-26775/", }, { category: "self", summary: "SUSE CVE CVE-2024-26777 page", url: "https://www.suse.com/security/cve/CVE-2024-26777/", }, { category: "self", summary: "SUSE CVE CVE-2024-26778 page", url: "https://www.suse.com/security/cve/CVE-2024-26778/", }, { category: "self", summary: "SUSE CVE CVE-2024-26788 page", url: "https://www.suse.com/security/cve/CVE-2024-26788/", }, { category: "self", summary: "SUSE CVE CVE-2024-26791 page", url: "https://www.suse.com/security/cve/CVE-2024-26791/", }, { category: "self", summary: "SUSE CVE CVE-2024-26801 page", url: "https://www.suse.com/security/cve/CVE-2024-26801/", }, { category: "self", summary: "SUSE CVE CVE-2024-26822 page", url: "https://www.suse.com/security/cve/CVE-2024-26822/", }, { category: "self", summary: "SUSE CVE CVE-2024-26828 page", url: "https://www.suse.com/security/cve/CVE-2024-26828/", }, { category: "self", summary: "SUSE CVE CVE-2024-26829 page", url: "https://www.suse.com/security/cve/CVE-2024-26829/", }, { category: "self", summary: "SUSE CVE CVE-2024-26838 page", url: "https://www.suse.com/security/cve/CVE-2024-26838/", }, { category: "self", summary: "SUSE CVE CVE-2024-26839 page", url: "https://www.suse.com/security/cve/CVE-2024-26839/", }, { category: "self", summary: "SUSE CVE CVE-2024-26840 page", url: "https://www.suse.com/security/cve/CVE-2024-26840/", }, { category: "self", summary: "SUSE CVE CVE-2024-26846 page", url: "https://www.suse.com/security/cve/CVE-2024-26846/", }, { category: "self", summary: "SUSE CVE CVE-2024-26859 page", url: "https://www.suse.com/security/cve/CVE-2024-26859/", }, { category: "self", summary: "SUSE CVE CVE-2024-26870 page", url: "https://www.suse.com/security/cve/CVE-2024-26870/", }, { category: "self", summary: "SUSE CVE CVE-2024-26874 page", url: "https://www.suse.com/security/cve/CVE-2024-26874/", }, { category: "self", summary: "SUSE CVE CVE-2024-26876 page", url: "https://www.suse.com/security/cve/CVE-2024-26876/", }, { category: "self", summary: "SUSE CVE CVE-2024-26877 page", url: "https://www.suse.com/security/cve/CVE-2024-26877/", }, { category: "self", summary: "SUSE CVE CVE-2024-26880 page", url: "https://www.suse.com/security/cve/CVE-2024-26880/", }, { category: "self", summary: "SUSE CVE CVE-2024-26889 page", url: "https://www.suse.com/security/cve/CVE-2024-26889/", }, { category: "self", summary: "SUSE CVE CVE-2024-26894 page", url: "https://www.suse.com/security/cve/CVE-2024-26894/", }, { category: "self", summary: "SUSE CVE CVE-2024-26900 page", url: "https://www.suse.com/security/cve/CVE-2024-26900/", }, { category: "self", summary: "SUSE CVE CVE-2024-26907 page", url: "https://www.suse.com/security/cve/CVE-2024-26907/", }, { category: "self", summary: "SUSE CVE CVE-2024-26915 page", url: "https://www.suse.com/security/cve/CVE-2024-26915/", }, { category: "self", summary: "SUSE CVE CVE-2024-26916 page", url: "https://www.suse.com/security/cve/CVE-2024-26916/", }, { category: "self", summary: "SUSE CVE CVE-2024-26919 page", url: "https://www.suse.com/security/cve/CVE-2024-26919/", }, { category: "self", summary: "SUSE CVE CVE-2024-26920 page", url: "https://www.suse.com/security/cve/CVE-2024-26920/", }, { category: "self", summary: "SUSE CVE CVE-2024-26921 page", url: "https://www.suse.com/security/cve/CVE-2024-26921/", }, { category: "self", summary: "SUSE CVE CVE-2024-26922 page", url: "https://www.suse.com/security/cve/CVE-2024-26922/", }, { category: "self", summary: "SUSE CVE CVE-2024-26925 page", url: "https://www.suse.com/security/cve/CVE-2024-26925/", }, { category: "self", summary: "SUSE CVE CVE-2024-26928 page", url: "https://www.suse.com/security/cve/CVE-2024-26928/", }, { category: "self", summary: "SUSE CVE CVE-2024-26929 page", url: "https://www.suse.com/security/cve/CVE-2024-26929/", }, { category: "self", summary: "SUSE CVE CVE-2024-26930 page", url: "https://www.suse.com/security/cve/CVE-2024-26930/", }, { category: "self", summary: "SUSE CVE CVE-2024-26931 page", url: "https://www.suse.com/security/cve/CVE-2024-26931/", }, { category: "self", summary: "SUSE CVE CVE-2024-26933 page", url: "https://www.suse.com/security/cve/CVE-2024-26933/", }, { category: "self", summary: "SUSE CVE CVE-2024-26934 page", url: "https://www.suse.com/security/cve/CVE-2024-26934/", }, { category: "self", summary: "SUSE CVE CVE-2024-26935 page", url: "https://www.suse.com/security/cve/CVE-2024-26935/", }, { category: "self", summary: "SUSE CVE CVE-2024-26937 page", url: "https://www.suse.com/security/cve/CVE-2024-26937/", }, { category: "self", summary: "SUSE CVE CVE-2024-26938 page", url: "https://www.suse.com/security/cve/CVE-2024-26938/", }, { category: "self", summary: "SUSE CVE CVE-2024-26939 page", url: "https://www.suse.com/security/cve/CVE-2024-26939/", }, { category: "self", summary: "SUSE CVE CVE-2024-26940 page", url: "https://www.suse.com/security/cve/CVE-2024-26940/", }, { category: "self", summary: "SUSE CVE CVE-2024-26943 page", url: "https://www.suse.com/security/cve/CVE-2024-26943/", }, { category: "self", summary: "SUSE CVE CVE-2024-26957 page", url: "https://www.suse.com/security/cve/CVE-2024-26957/", }, { category: "self", summary: "SUSE CVE CVE-2024-26958 page", url: "https://www.suse.com/security/cve/CVE-2024-26958/", }, { category: "self", summary: "SUSE CVE CVE-2024-26964 page", url: "https://www.suse.com/security/cve/CVE-2024-26964/", }, { category: "self", summary: "SUSE CVE CVE-2024-26974 page", url: "https://www.suse.com/security/cve/CVE-2024-26974/", }, { category: "self", summary: "SUSE CVE CVE-2024-26977 page", url: "https://www.suse.com/security/cve/CVE-2024-26977/", }, { category: "self", summary: "SUSE CVE CVE-2024-26979 page", url: "https://www.suse.com/security/cve/CVE-2024-26979/", }, { category: "self", summary: "SUSE CVE CVE-2024-26984 page", url: "https://www.suse.com/security/cve/CVE-2024-26984/", }, { category: "self", summary: "SUSE CVE CVE-2024-26988 page", url: "https://www.suse.com/security/cve/CVE-2024-26988/", }, { category: "self", summary: "SUSE CVE CVE-2024-26989 page", url: "https://www.suse.com/security/cve/CVE-2024-26989/", }, { category: "self", summary: "SUSE CVE CVE-2024-26994 page", url: "https://www.suse.com/security/cve/CVE-2024-26994/", }, { category: "self", summary: "SUSE CVE CVE-2024-26996 page", url: "https://www.suse.com/security/cve/CVE-2024-26996/", }, { category: "self", summary: "SUSE CVE CVE-2024-26997 page", url: "https://www.suse.com/security/cve/CVE-2024-26997/", }, { category: "self", summary: "SUSE CVE CVE-2024-26999 page", url: "https://www.suse.com/security/cve/CVE-2024-26999/", }, { category: "self", summary: "SUSE CVE CVE-2024-27000 page", url: "https://www.suse.com/security/cve/CVE-2024-27000/", }, { category: "self", summary: "SUSE CVE CVE-2024-27001 page", url: "https://www.suse.com/security/cve/CVE-2024-27001/", }, { category: "self", summary: "SUSE CVE CVE-2024-27004 page", url: "https://www.suse.com/security/cve/CVE-2024-27004/", }, { category: "self", summary: "SUSE CVE CVE-2024-27008 page", url: "https://www.suse.com/security/cve/CVE-2024-27008/", }, { category: "self", summary: "SUSE CVE CVE-2024-27028 page", url: "https://www.suse.com/security/cve/CVE-2024-27028/", }, { category: "self", summary: "SUSE CVE CVE-2024-27037 page", url: "https://www.suse.com/security/cve/CVE-2024-27037/", }, { category: "self", summary: "SUSE CVE CVE-2024-27042 page", url: "https://www.suse.com/security/cve/CVE-2024-27042/", }, { category: "self", summary: "SUSE CVE CVE-2024-27045 page", url: "https://www.suse.com/security/cve/CVE-2024-27045/", }, { category: "self", summary: "SUSE CVE CVE-2024-27047 page", url: "https://www.suse.com/security/cve/CVE-2024-27047/", }, { category: "self", summary: "SUSE CVE CVE-2024-27051 page", url: "https://www.suse.com/security/cve/CVE-2024-27051/", }, { category: "self", summary: "SUSE CVE CVE-2024-27052 page", url: "https://www.suse.com/security/cve/CVE-2024-27052/", }, { category: "self", summary: "SUSE CVE CVE-2024-27053 page", url: "https://www.suse.com/security/cve/CVE-2024-27053/", }, { category: "self", summary: "SUSE CVE CVE-2024-27054 page", url: "https://www.suse.com/security/cve/CVE-2024-27054/", }, { category: "self", summary: "SUSE CVE CVE-2024-27059 page", url: "https://www.suse.com/security/cve/CVE-2024-27059/", }, { category: "self", summary: "SUSE CVE CVE-2024-27072 page", url: "https://www.suse.com/security/cve/CVE-2024-27072/", }, { category: "self", summary: "SUSE CVE CVE-2024-27073 page", url: "https://www.suse.com/security/cve/CVE-2024-27073/", }, { category: "self", summary: "SUSE CVE CVE-2024-27074 page", url: "https://www.suse.com/security/cve/CVE-2024-27074/", }, { category: "self", summary: "SUSE CVE CVE-2024-27075 page", url: "https://www.suse.com/security/cve/CVE-2024-27075/", }, { category: "self", summary: "SUSE CVE CVE-2024-27076 page", url: "https://www.suse.com/security/cve/CVE-2024-27076/", }, { category: "self", summary: "SUSE CVE CVE-2024-27077 page", url: "https://www.suse.com/security/cve/CVE-2024-27077/", }, { category: "self", summary: "SUSE CVE CVE-2024-27078 page", url: "https://www.suse.com/security/cve/CVE-2024-27078/", }, { category: "self", summary: "SUSE CVE CVE-2024-27388 page", url: "https://www.suse.com/security/cve/CVE-2024-27388/", }, { category: "self", summary: "SUSE CVE CVE-2024-27393 page", url: "https://www.suse.com/security/cve/CVE-2024-27393/", }, { category: "self", summary: "SUSE CVE CVE-2024-27395 page", url: "https://www.suse.com/security/cve/CVE-2024-27395/", }, { category: "self", summary: "SUSE CVE CVE-2024-27396 page", url: "https://www.suse.com/security/cve/CVE-2024-27396/", }, { category: "self", summary: "SUSE CVE CVE-2024-27398 page", url: "https://www.suse.com/security/cve/CVE-2024-27398/", }, { category: "self", summary: "SUSE CVE CVE-2024-27399 page", url: "https://www.suse.com/security/cve/CVE-2024-27399/", }, { category: "self", summary: "SUSE CVE CVE-2024-27400 page", url: "https://www.suse.com/security/cve/CVE-2024-27400/", }, { category: "self", summary: "SUSE CVE CVE-2024-27401 page", url: "https://www.suse.com/security/cve/CVE-2024-27401/", }, { category: "self", summary: "SUSE CVE CVE-2024-27405 page", url: "https://www.suse.com/security/cve/CVE-2024-27405/", }, { category: "self", summary: "SUSE CVE CVE-2024-27410 page", url: "https://www.suse.com/security/cve/CVE-2024-27410/", }, { category: "self", summary: "SUSE CVE CVE-2024-27412 page", url: "https://www.suse.com/security/cve/CVE-2024-27412/", }, { category: "self", summary: "SUSE CVE CVE-2024-27413 page", url: "https://www.suse.com/security/cve/CVE-2024-27413/", }, { category: "self", summary: "SUSE CVE CVE-2024-27416 page", url: "https://www.suse.com/security/cve/CVE-2024-27416/", }, { category: "self", summary: "SUSE CVE CVE-2024-27417 page", url: "https://www.suse.com/security/cve/CVE-2024-27417/", }, { category: "self", summary: "SUSE CVE CVE-2024-27419 page", url: "https://www.suse.com/security/cve/CVE-2024-27419/", }, { category: "self", summary: "SUSE CVE CVE-2024-27431 page", url: "https://www.suse.com/security/cve/CVE-2024-27431/", }, { category: "self", summary: "SUSE CVE CVE-2024-27435 page", url: "https://www.suse.com/security/cve/CVE-2024-27435/", }, { category: "self", summary: "SUSE CVE CVE-2024-27436 page", url: "https://www.suse.com/security/cve/CVE-2024-27436/", }, { category: "self", summary: "SUSE CVE CVE-2024-35789 page", url: "https://www.suse.com/security/cve/CVE-2024-35789/", }, { category: "self", summary: "SUSE CVE CVE-2024-35791 page", url: "https://www.suse.com/security/cve/CVE-2024-35791/", }, { category: "self", summary: "SUSE CVE CVE-2024-35796 page", url: "https://www.suse.com/security/cve/CVE-2024-35796/", }, { category: "self", summary: "SUSE CVE CVE-2024-35799 page", url: "https://www.suse.com/security/cve/CVE-2024-35799/", }, { category: "self", summary: "SUSE CVE CVE-2024-35801 page", url: "https://www.suse.com/security/cve/CVE-2024-35801/", }, { category: "self", summary: "SUSE CVE CVE-2024-35804 page", url: "https://www.suse.com/security/cve/CVE-2024-35804/", }, { category: "self", summary: "SUSE CVE CVE-2024-35806 page", url: "https://www.suse.com/security/cve/CVE-2024-35806/", }, { category: "self", summary: "SUSE CVE CVE-2024-35809 page", url: "https://www.suse.com/security/cve/CVE-2024-35809/", }, { category: "self", summary: "SUSE CVE CVE-2024-35811 page", url: "https://www.suse.com/security/cve/CVE-2024-35811/", }, { category: "self", summary: "SUSE CVE CVE-2024-35812 page", url: "https://www.suse.com/security/cve/CVE-2024-35812/", }, { category: "self", summary: "SUSE CVE CVE-2024-35813 page", url: "https://www.suse.com/security/cve/CVE-2024-35813/", }, { category: "self", summary: "SUSE CVE CVE-2024-35815 page", url: "https://www.suse.com/security/cve/CVE-2024-35815/", }, { category: "self", summary: "SUSE CVE CVE-2024-35817 page", url: "https://www.suse.com/security/cve/CVE-2024-35817/", }, { category: "self", summary: "SUSE CVE CVE-2024-35821 page", url: "https://www.suse.com/security/cve/CVE-2024-35821/", }, { category: "self", summary: "SUSE CVE CVE-2024-35822 page", url: "https://www.suse.com/security/cve/CVE-2024-35822/", }, { category: "self", summary: "SUSE CVE CVE-2024-35823 page", url: "https://www.suse.com/security/cve/CVE-2024-35823/", }, { category: "self", summary: "SUSE CVE CVE-2024-35825 page", url: "https://www.suse.com/security/cve/CVE-2024-35825/", }, { category: "self", summary: "SUSE CVE CVE-2024-35828 page", url: "https://www.suse.com/security/cve/CVE-2024-35828/", }, { category: "self", summary: "SUSE CVE CVE-2024-35829 page", url: "https://www.suse.com/security/cve/CVE-2024-35829/", }, { category: "self", summary: "SUSE CVE CVE-2024-35830 page", url: "https://www.suse.com/security/cve/CVE-2024-35830/", }, { category: "self", summary: "SUSE CVE CVE-2024-35833 page", url: "https://www.suse.com/security/cve/CVE-2024-35833/", }, { category: "self", summary: "SUSE CVE CVE-2024-35845 page", url: "https://www.suse.com/security/cve/CVE-2024-35845/", }, { category: "self", summary: "SUSE CVE CVE-2024-35847 page", url: "https://www.suse.com/security/cve/CVE-2024-35847/", }, { category: "self", summary: "SUSE CVE CVE-2024-35849 page", url: "https://www.suse.com/security/cve/CVE-2024-35849/", }, { category: "self", summary: "SUSE CVE CVE-2024-35851 page", url: "https://www.suse.com/security/cve/CVE-2024-35851/", }, { category: "self", summary: "SUSE CVE CVE-2024-35852 page", url: "https://www.suse.com/security/cve/CVE-2024-35852/", }, { category: "self", summary: "SUSE CVE CVE-2024-35854 page", url: "https://www.suse.com/security/cve/CVE-2024-35854/", }, { category: "self", summary: "SUSE CVE CVE-2024-35860 page", url: "https://www.suse.com/security/cve/CVE-2024-35860/", }, { category: "self", summary: "SUSE CVE CVE-2024-35861 page", url: "https://www.suse.com/security/cve/CVE-2024-35861/", }, { category: "self", summary: "SUSE CVE CVE-2024-35862 page", url: "https://www.suse.com/security/cve/CVE-2024-35862/", }, { category: "self", summary: "SUSE CVE CVE-2024-35863 page", url: "https://www.suse.com/security/cve/CVE-2024-35863/", }, { category: "self", summary: "SUSE CVE CVE-2024-35864 page", url: "https://www.suse.com/security/cve/CVE-2024-35864/", }, { category: "self", summary: "SUSE CVE CVE-2024-35865 page", url: "https://www.suse.com/security/cve/CVE-2024-35865/", }, { category: "self", summary: "SUSE CVE CVE-2024-35866 page", url: "https://www.suse.com/security/cve/CVE-2024-35866/", }, { category: "self", summary: "SUSE CVE CVE-2024-35867 page", url: "https://www.suse.com/security/cve/CVE-2024-35867/", }, { category: "self", summary: "SUSE CVE CVE-2024-35868 page", url: "https://www.suse.com/security/cve/CVE-2024-35868/", }, { category: "self", summary: "SUSE CVE CVE-2024-35869 page", url: "https://www.suse.com/security/cve/CVE-2024-35869/", }, { category: "self", summary: "SUSE CVE CVE-2024-35870 page", url: "https://www.suse.com/security/cve/CVE-2024-35870/", }, { category: "self", summary: "SUSE CVE CVE-2024-35872 page", url: "https://www.suse.com/security/cve/CVE-2024-35872/", }, { category: "self", summary: "SUSE CVE CVE-2024-35875 page", url: "https://www.suse.com/security/cve/CVE-2024-35875/", }, { category: "self", summary: "SUSE CVE CVE-2024-35877 page", url: "https://www.suse.com/security/cve/CVE-2024-35877/", }, { category: "self", summary: "SUSE CVE CVE-2024-35878 page", url: "https://www.suse.com/security/cve/CVE-2024-35878/", }, { category: "self", summary: "SUSE CVE CVE-2024-35879 page", url: "https://www.suse.com/security/cve/CVE-2024-35879/", }, { category: "self", summary: "SUSE CVE CVE-2024-35885 page", url: "https://www.suse.com/security/cve/CVE-2024-35885/", }, { category: "self", summary: "SUSE CVE CVE-2024-35887 page", url: "https://www.suse.com/security/cve/CVE-2024-35887/", }, { category: "self", summary: "SUSE CVE CVE-2024-35895 page", url: "https://www.suse.com/security/cve/CVE-2024-35895/", }, { category: "self", summary: "SUSE CVE CVE-2024-35901 page", url: "https://www.suse.com/security/cve/CVE-2024-35901/", }, { category: "self", summary: "SUSE CVE CVE-2024-35904 page", url: "https://www.suse.com/security/cve/CVE-2024-35904/", }, { category: "self", summary: "SUSE CVE CVE-2024-35905 page", url: "https://www.suse.com/security/cve/CVE-2024-35905/", }, { category: "self", summary: "SUSE CVE CVE-2024-35907 page", url: "https://www.suse.com/security/cve/CVE-2024-35907/", }, { category: "self", summary: "SUSE CVE CVE-2024-35912 page", url: "https://www.suse.com/security/cve/CVE-2024-35912/", }, { category: "self", summary: "SUSE CVE CVE-2024-35914 page", url: "https://www.suse.com/security/cve/CVE-2024-35914/", }, { category: "self", summary: "SUSE CVE CVE-2024-35915 page", url: "https://www.suse.com/security/cve/CVE-2024-35915/", }, { category: "self", summary: "SUSE CVE CVE-2024-35922 page", url: "https://www.suse.com/security/cve/CVE-2024-35922/", }, { category: "self", summary: "SUSE CVE CVE-2024-35924 page", url: "https://www.suse.com/security/cve/CVE-2024-35924/", }, { category: "self", summary: "SUSE CVE CVE-2024-35930 page", url: "https://www.suse.com/security/cve/CVE-2024-35930/", }, { category: "self", summary: "SUSE CVE CVE-2024-35932 page", url: "https://www.suse.com/security/cve/CVE-2024-35932/", }, { category: "self", summary: "SUSE CVE CVE-2024-35933 page", url: "https://www.suse.com/security/cve/CVE-2024-35933/", }, { category: "self", summary: "SUSE CVE CVE-2024-35935 page", url: "https://www.suse.com/security/cve/CVE-2024-35935/", }, { category: "self", summary: "SUSE CVE CVE-2024-35936 page", url: "https://www.suse.com/security/cve/CVE-2024-35936/", }, { category: "self", summary: "SUSE CVE CVE-2024-35938 page", url: "https://www.suse.com/security/cve/CVE-2024-35938/", }, { category: "self", summary: "SUSE CVE CVE-2024-35939 page", url: "https://www.suse.com/security/cve/CVE-2024-35939/", }, { category: "self", summary: "SUSE CVE CVE-2024-35940 page", url: "https://www.suse.com/security/cve/CVE-2024-35940/", }, { category: "self", summary: "SUSE CVE CVE-2024-35943 page", url: "https://www.suse.com/security/cve/CVE-2024-35943/", }, { category: "self", summary: "SUSE CVE CVE-2024-35944 page", url: "https://www.suse.com/security/cve/CVE-2024-35944/", }, { category: "self", summary: "SUSE CVE CVE-2024-35947 page", url: "https://www.suse.com/security/cve/CVE-2024-35947/", }, { category: "self", summary: "SUSE CVE CVE-2024-35950 page", url: "https://www.suse.com/security/cve/CVE-2024-35950/", }, { category: "self", summary: "SUSE CVE CVE-2024-35951 page", url: "https://www.suse.com/security/cve/CVE-2024-35951/", }, { category: "self", summary: "SUSE CVE CVE-2024-35952 page", url: "https://www.suse.com/security/cve/CVE-2024-35952/", }, { category: "self", summary: "SUSE CVE CVE-2024-35955 page", url: "https://www.suse.com/security/cve/CVE-2024-35955/", }, { category: "self", summary: "SUSE CVE CVE-2024-35959 page", url: "https://www.suse.com/security/cve/CVE-2024-35959/", }, { category: "self", summary: "SUSE CVE CVE-2024-35963 page", url: "https://www.suse.com/security/cve/CVE-2024-35963/", }, { category: "self", summary: "SUSE CVE CVE-2024-35964 page", url: "https://www.suse.com/security/cve/CVE-2024-35964/", }, { category: "self", summary: "SUSE CVE CVE-2024-35965 page", url: "https://www.suse.com/security/cve/CVE-2024-35965/", }, { category: "self", summary: "SUSE CVE CVE-2024-35966 page", url: "https://www.suse.com/security/cve/CVE-2024-35966/", }, { category: "self", summary: "SUSE CVE CVE-2024-35967 page", url: "https://www.suse.com/security/cve/CVE-2024-35967/", }, { category: "self", summary: "SUSE CVE CVE-2024-35969 page", url: "https://www.suse.com/security/cve/CVE-2024-35969/", }, { category: "self", summary: "SUSE CVE CVE-2024-35973 page", url: "https://www.suse.com/security/cve/CVE-2024-35973/", }, { category: "self", summary: "SUSE CVE CVE-2024-35976 page", url: "https://www.suse.com/security/cve/CVE-2024-35976/", }, { category: "self", summary: "SUSE CVE CVE-2024-35978 page", url: "https://www.suse.com/security/cve/CVE-2024-35978/", }, { category: "self", summary: "SUSE CVE CVE-2024-35982 page", url: "https://www.suse.com/security/cve/CVE-2024-35982/", }, { category: "self", summary: "SUSE CVE CVE-2024-35984 page", url: "https://www.suse.com/security/cve/CVE-2024-35984/", }, { category: "self", summary: "SUSE CVE CVE-2024-35989 page", url: "https://www.suse.com/security/cve/CVE-2024-35989/", }, { category: "self", summary: "SUSE CVE CVE-2024-35990 page", url: "https://www.suse.com/security/cve/CVE-2024-35990/", }, { category: "self", summary: "SUSE CVE CVE-2024-35998 page", url: "https://www.suse.com/security/cve/CVE-2024-35998/", }, { category: "self", summary: "SUSE CVE CVE-2024-35999 page", url: "https://www.suse.com/security/cve/CVE-2024-35999/", }, { category: "self", summary: "SUSE CVE CVE-2024-36006 page", url: "https://www.suse.com/security/cve/CVE-2024-36006/", }, { category: "self", summary: "SUSE CVE CVE-2024-36007 page", url: "https://www.suse.com/security/cve/CVE-2024-36007/", }, { category: "self", summary: "SUSE CVE CVE-2024-36012 page", url: "https://www.suse.com/security/cve/CVE-2024-36012/", }, { category: "self", summary: "SUSE CVE CVE-2024-36014 page", url: "https://www.suse.com/security/cve/CVE-2024-36014/", }, { category: "self", summary: "SUSE CVE CVE-2024-36015 page", url: "https://www.suse.com/security/cve/CVE-2024-36015/", }, { category: "self", summary: "SUSE CVE CVE-2024-36016 page", url: "https://www.suse.com/security/cve/CVE-2024-36016/", }, { category: "self", summary: "SUSE CVE CVE-2024-36026 page", url: "https://www.suse.com/security/cve/CVE-2024-36026/", }, { category: "self", summary: "SUSE CVE CVE-2024-36029 page", url: "https://www.suse.com/security/cve/CVE-2024-36029/", }, { category: "self", summary: "SUSE CVE CVE-2024-36032 page", url: "https://www.suse.com/security/cve/CVE-2024-36032/", }, { category: "self", summary: "SUSE CVE CVE-2024-36880 page", url: "https://www.suse.com/security/cve/CVE-2024-36880/", }, { category: "self", summary: "SUSE CVE CVE-2024-36893 page", url: "https://www.suse.com/security/cve/CVE-2024-36893/", }, { category: "self", summary: "SUSE CVE CVE-2024-36896 page", url: "https://www.suse.com/security/cve/CVE-2024-36896/", }, { category: "self", summary: "SUSE CVE CVE-2024-36897 page", url: "https://www.suse.com/security/cve/CVE-2024-36897/", }, { category: "self", summary: "SUSE CVE CVE-2024-36906 page", url: "https://www.suse.com/security/cve/CVE-2024-36906/", }, { category: "self", summary: "SUSE CVE CVE-2024-36918 page", url: "https://www.suse.com/security/cve/CVE-2024-36918/", }, { category: "self", summary: "SUSE CVE CVE-2024-36924 page", url: "https://www.suse.com/security/cve/CVE-2024-36924/", }, { category: "self", summary: "SUSE CVE CVE-2024-36926 page", url: "https://www.suse.com/security/cve/CVE-2024-36926/", }, { category: "self", summary: "SUSE CVE CVE-2024-36928 page", url: "https://www.suse.com/security/cve/CVE-2024-36928/", }, { category: "self", summary: "SUSE CVE CVE-2024-36931 page", url: "https://www.suse.com/security/cve/CVE-2024-36931/", }, { category: "self", summary: "SUSE CVE CVE-2024-36938 page", url: "https://www.suse.com/security/cve/CVE-2024-36938/", }, { category: "self", summary: "SUSE CVE CVE-2024-36940 page", url: "https://www.suse.com/security/cve/CVE-2024-36940/", }, { category: "self", summary: "SUSE CVE CVE-2024-36941 page", url: "https://www.suse.com/security/cve/CVE-2024-36941/", }, { category: "self", summary: "SUSE CVE CVE-2024-36942 page", url: "https://www.suse.com/security/cve/CVE-2024-36942/", }, { category: "self", summary: "SUSE CVE CVE-2024-36944 page", url: "https://www.suse.com/security/cve/CVE-2024-36944/", }, { category: "self", summary: "SUSE CVE CVE-2024-36947 page", url: "https://www.suse.com/security/cve/CVE-2024-36947/", }, { category: "self", summary: "SUSE CVE CVE-2024-36950 page", url: "https://www.suse.com/security/cve/CVE-2024-36950/", }, { category: "self", summary: "SUSE CVE CVE-2024-36952 page", url: "https://www.suse.com/security/cve/CVE-2024-36952/", }, { category: "self", summary: "SUSE CVE CVE-2024-36955 page", url: "https://www.suse.com/security/cve/CVE-2024-36955/", }, { category: "self", summary: "SUSE CVE CVE-2024-36959 page", url: "https://www.suse.com/security/cve/CVE-2024-36959/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2024-06-12T11:33:43Z", generator: { date: "2024-06-12T11:33:43Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2024:2008-1", initial_release_date: "2024-06-12T11:33:43Z", revision_history: [ { date: "2024-06-12T11:33:43Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-5.14.21-150500.13.58.1.noarch", product: { name: "kernel-devel-rt-5.14.21-150500.13.58.1.noarch", product_id: "kernel-devel-rt-5.14.21-150500.13.58.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-5.14.21-150500.13.58.1.noarch", product: { name: "kernel-source-rt-5.14.21-150500.13.58.1.noarch", product_id: "kernel-source-rt-5.14.21-150500.13.58.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", product: { name: "cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", product_id: "cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", product: { name: "dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", product_id: "dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", product: { name: "gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", product_id: "gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", product: { name: "kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", product_id: "kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-5.14.21-150500.13.58.1.x86_64", product: { name: "kernel-rt-5.14.21-150500.13.58.1.x86_64", product_id: "kernel-rt-5.14.21-150500.13.58.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", product: { name: "kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", product_id: "kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", product: { name: "kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", product_id: "kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", product: { name: "kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", product_id: "kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", product: { name: "kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", product_id: "kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", product: { name: "kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", product_id: "kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", product: { name: "kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", product_id: "kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", product: { name: "kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", product_id: "kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", product: { name: "kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", product_id: "kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", product: { name: "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", product_id: "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", product: { name: "kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", product_id: "kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", product: { name: "kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", product_id: "kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", product: { name: "kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", product_id: "kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", product: { name: "ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", product_id: "ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", product: { name: "reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", product_id: "reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Micro 5.5", product: { name: "SUSE Linux Enterprise Micro 5.5", product_id: "SUSE Linux Enterprise Micro 5.5", product_identification_helper: { cpe: "cpe:/o:suse:sle-micro:5.5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP5", product: { name: "SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp5", }, }, }, { category: "product_name", name: "SUSE Real Time Module 15 SP5", product: { name: "SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-rt:15:sp5", }, }, }, { category: "product_name", name: "openSUSE Leap 15.5", product: { name: "openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150500.13.58.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", product_id: "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.14.21-150500.13.58.1.noarch as component of SUSE Linux Enterprise Micro 5.5", product_id: "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", }, product_reference: "kernel-source-rt-5.14.21-150500.13.58.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.5", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", }, product_reference: "kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", }, product_reference: "cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", }, product_reference: "dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", }, product_reference: "gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.14.21-150500.13.58.1.noarch as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", }, product_reference: "kernel-devel-rt-5.14.21-150500.13.58.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150500.13.58.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.14.21-150500.13.58.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", }, product_reference: "kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", }, product_reference: "kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-5.14.21-150500.13.58.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", }, product_reference: "kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", }, product_reference: "kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", }, product_reference: "kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.14.21-150500.13.58.1.noarch as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", }, product_reference: "kernel-source-rt-5.14.21-150500.13.58.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.14.21-150500.13.58.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", }, product_reference: "kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", }, product_reference: "ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", }, product_reference: "cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", }, product_reference: "dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", }, product_reference: "gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.14.21-150500.13.58.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", }, product_reference: "kernel-devel-rt-5.14.21-150500.13.58.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150500.13.58.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.14.21-150500.13.58.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", }, product_reference: "kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-extra-5.14.21-150500.13.58.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", }, product_reference: "kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", }, product_reference: "kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", }, product_reference: "kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-optional-5.14.21-150500.13.58.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", }, product_reference: "kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", }, product_reference: "kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-5.14.21-150500.13.58.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", }, product_reference: "kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", }, product_reference: "kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", }, product_reference: "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", }, product_reference: "kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.14.21-150500.13.58.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", }, product_reference: "kernel-source-rt-5.14.21-150500.13.58.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.14.21-150500.13.58.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", }, product_reference: "kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", }, product_reference: "kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", }, product_reference: "ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", }, product_reference: "reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, ], }, vulnerabilities: [ { cve: "CVE-2020-36788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-36788", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau: avoid a use-after-free when BO init fails\n\nnouveau_bo_init() is backed by ttm_bo_init() and ferries its return code\nback to the caller. On failures, ttm_bo_init() invokes the provided\ndestructor which should de-initialize and free the memory.\n\nThus, when nouveau_bo_init() returns an error the gem object has already\nbeen released and the memory freed by nouveau_bo_del_ttm().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-36788", url: "https://www.suse.com/security/cve/CVE-2020-36788", }, { category: "external", summary: "SUSE Bug 1224816 for CVE-2020-36788", url: "https://bugzilla.suse.com/1224816", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2020-36788", }, { cve: "CVE-2021-39698", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39698", }, ], notes: [ { category: "general", text: "In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-185125206References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39698", url: "https://www.suse.com/security/cve/CVE-2021-39698", }, { category: "external", summary: "SUSE Bug 1196956 for CVE-2021-39698", url: "https://bugzilla.suse.com/1196956", }, { category: "external", summary: "SUSE Bug 1196959 for CVE-2021-39698", url: "https://bugzilla.suse.com/1196959", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2021-39698", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2021-39698", }, { cve: "CVE-2021-4148", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4148", }, ], notes: [ { category: "general", text: "A vulnerability was found in the Linux kernel's block_invalidatepage in fs/buffer.c in the filesystem. A missing sanity check may allow a local attacker with user privilege to cause a denial of service (DOS) problem.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4148", url: "https://www.suse.com/security/cve/CVE-2021-4148", }, { category: "external", summary: "SUSE Bug 1193983 for CVE-2021-4148", url: "https://bugzilla.suse.com/1193983", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-4148", }, { cve: "CVE-2021-42327", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42327", }, ], notes: [ { category: "general", text: "dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42327", url: "https://www.suse.com/security/cve/CVE-2021-42327", }, { category: "external", summary: "SUSE Bug 1191949 for CVE-2021-42327", url: "https://bugzilla.suse.com/1191949", }, { category: "external", summary: "SUSE Bug 1224901 for CVE-2021-42327", url: "https://bugzilla.suse.com/1224901", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2021-42327", }, { cve: "CVE-2021-43056", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-43056", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel for powerpc before 5.14.15. It allows a malicious KVM guest to crash the host, when the host is running on Power8, due to an arch/powerpc/kvm/book3s_hv_rmhandlers.S implementation bug in the handling of the SRR1 register values.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-43056", url: "https://www.suse.com/security/cve/CVE-2021-43056", }, { category: "external", summary: "SUSE Bug 1192107 for CVE-2021-43056", url: "https://bugzilla.suse.com/1192107", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-43056", }, { cve: "CVE-2021-43527", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-43527", }, ], notes: [ { category: "general", text: "NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \\#7, or PKCS \\#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS < 3.73 and NSS < 3.68.1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-43527", url: "https://www.suse.com/security/cve/CVE-2021-43527", }, { category: "external", summary: "SUSE Bug 1193170 for CVE-2021-43527", url: "https://bugzilla.suse.com/1193170", }, { category: "external", summary: "SUSE Bug 1193331 for CVE-2021-43527", url: "https://bugzilla.suse.com/1193331", }, { category: "external", summary: "SUSE Bug 1193378 for CVE-2021-43527", url: "https://bugzilla.suse.com/1193378", }, { category: "external", summary: "SUSE Bug 1194288 for CVE-2021-43527", url: "https://bugzilla.suse.com/1194288", }, { category: "external", summary: "SUSE Bug 1199301 for CVE-2021-43527", url: "https://bugzilla.suse.com/1199301", }, { category: "external", summary: "SUSE Bug 1225630 for CVE-2021-43527", url: "https://bugzilla.suse.com/1225630", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2021-43527", }, { cve: "CVE-2021-47200", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47200", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/prime: Fix use after free in mmap with drm_gem_ttm_mmap\n\ndrm_gem_ttm_mmap() drops a reference to the gem object on success. If\nthe gem object's refcount == 1 on entry to drm_gem_prime_mmap(), that\ndrop will free the gem object, and the subsequent drm_gem_object_get()\nwill be a UAF. Fix by grabbing a reference before calling the mmap\nhelper.\n\nThis issue was forseen when the reference dropping was adding in\ncommit 9786b65bc61ac (\"drm/ttm: fix mmap refcounting\"):\n \"For that to work properly the drm_gem_object_get() call in\n drm_gem_ttm_mmap() must be moved so it happens before calling\n obj->funcs->mmap(), otherwise the gem refcount would go down\n to zero.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47200", url: "https://www.suse.com/security/cve/CVE-2021-47200", }, { category: "external", summary: "SUSE Bug 1222838 for CVE-2021-47200", url: "https://bugzilla.suse.com/1222838", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47200", }, { cve: "CVE-2021-47358", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47358", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: greybus: uart: fix tty use after free\n\nUser space can hold a tty open indefinitely and tty drivers must not\nrelease the underlying structures until the last user is gone.\n\nSwitch to using the tty-port reference counter to manage the life time\nof the greybus tty state to avoid use after free after a disconnect.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47358", url: "https://www.suse.com/security/cve/CVE-2021-47358", }, { category: "external", summary: "SUSE Bug 1224920 for CVE-2021-47358", url: "https://bugzilla.suse.com/1224920", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47358", }, { cve: "CVE-2021-47359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47359", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix soft lockup during fsstress\n\nBelow traces are observed during fsstress and system got hung.\n[ 130.698396] watchdog: BUG: soft lockup - CPU#6 stuck for 26s!", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47359", url: "https://www.suse.com/security/cve/CVE-2021-47359", }, { category: "external", summary: "SUSE Bug 1225145 for CVE-2021-47359", url: "https://bugzilla.suse.com/1225145", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47359", }, { cve: "CVE-2021-47360", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47360", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: make sure fd closes complete\n\nDuring BC_FREE_BUFFER processing, the BINDER_TYPE_FDA object\ncleanup may close 1 or more fds. The close operations are\ncompleted using the task work mechanism -- which means the thread\nneeds to return to userspace or the file object may never be\ndereferenced -- which can lead to hung processes.\n\nForce the binder thread back to userspace if an fd is closed during\nBC_FREE_BUFFER handling.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47360", url: "https://www.suse.com/security/cve/CVE-2021-47360", }, { category: "external", summary: "SUSE Bug 1225122 for CVE-2021-47360", url: "https://bugzilla.suse.com/1225122", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47360", }, { cve: "CVE-2021-47361", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47361", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmcb: fix error handling in mcb_alloc_bus()\n\nThere are two bugs:\n1) If ida_simple_get() fails then this code calls put_device(carrier)\n but we haven't yet called get_device(carrier) and probably that\n leads to a use after free.\n2) After device_initialize() then we need to use put_device() to\n release the bus. This will free the internal resources tied to the\n device and call mcb_free_bus() which will free the rest.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47361", url: "https://www.suse.com/security/cve/CVE-2021-47361", }, { category: "external", summary: "SUSE Bug 1225151 for CVE-2021-47361", url: "https://bugzilla.suse.com/1225151", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47361", }, { cve: "CVE-2021-47362", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47362", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: Update intermediate power state for SI\n\nUpdate the current state as boot state during dpm initialization.\nDuring the subsequent initialization, set_power_state gets called to\ntransition to the final power state. set_power_state refers to values\nfrom the current state and without current state populated, it could\nresult in NULL pointer dereference.\n\nFor ex: on platforms where PCI speed change is supported through ACPI\nATCS method, the link speed of current state needs to be queried before\ndeciding on changing to final power state's link speed. The logic to query\nATCS-support was broken on certain platforms. The issue became visible\nwhen broken ATCS-support logic got fixed with commit\nf9b7f3703ff9 (\"drm/amdgpu/acpi: make ATPX/ATCS structures global (v2)\").\n\nBug: https://gitlab.freedesktop.org/drm/amd/-/issues/1698", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47362", url: "https://www.suse.com/security/cve/CVE-2021-47362", }, { category: "external", summary: "SUSE Bug 1225153 for CVE-2021-47362", url: "https://bugzilla.suse.com/1225153", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47362", }, { cve: "CVE-2021-47363", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47363", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Fix division by zero while replacing a resilient group\n\nThe resilient nexthop group torture tests in fib_nexthop.sh exposed a\npossible division by zero while replacing a resilient group [1]. The\ndivision by zero occurs when the data path sees a resilient nexthop\ngroup with zero buckets.\n\nThe tests replace a resilient nexthop group in a loop while traffic is\nforwarded through it. The tests do not specify the number of buckets\nwhile performing the replacement, resulting in the kernel allocating a\nstub resilient table (i.e, 'struct nh_res_table') with zero buckets.\n\nThis table should never be visible to the data path, but the old nexthop\ngroup (i.e., 'oldg') might still be used by the data path when the stub\ntable is assigned to it.\n\nFix this by only assigning the stub table to the old nexthop group after\nmaking sure the group is no longer used by the data path.\n\nTested with fib_nexthops.sh:\n\nTests passed: 222\nTests failed: 0\n\n[1]\n divide error: 0000 [#1] PREEMPT SMP KASAN\n CPU: 0 PID: 1850 Comm: ping Not tainted 5.14.0-custom-10271-ga86eb53057fe #1107\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-4.fc34 04/01/2014\n RIP: 0010:nexthop_select_path+0x2d2/0x1a80\n[...]\n Call Trace:\n fib_select_multipath+0x79b/0x1530\n fib_select_path+0x8fb/0x1c10\n ip_route_output_key_hash_rcu+0x1198/0x2da0\n ip_route_output_key_hash+0x190/0x340\n ip_route_output_flow+0x21/0x120\n raw_sendmsg+0x91d/0x2e10\n inet_sendmsg+0x9e/0xe0\n __sys_sendto+0x23d/0x360\n __x64_sys_sendto+0xe1/0x1b0\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47363", url: "https://www.suse.com/security/cve/CVE-2021-47363", }, { category: "external", summary: "SUSE Bug 1225156 for CVE-2021-47363", url: "https://bugzilla.suse.com/1225156", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47363", }, { cve: "CVE-2021-47364", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47364", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: Fix memory leak in compat_insnlist()\n\n`compat_insnlist()` handles the 32-bit version of the `COMEDI_INSNLIST`\nioctl (whenwhen `CONFIG_COMPAT` is enabled). It allocates memory to\ntemporarily hold an array of `struct comedi_insn` converted from the\n32-bit version in user space. This memory is only being freed if there\nis a fault while filling the array, otherwise it is leaked.\n\nAdd a call to `kfree()` to fix the leak.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47364", url: "https://www.suse.com/security/cve/CVE-2021-47364", }, { category: "external", summary: "SUSE Bug 1225158 for CVE-2021-47364", url: "https://bugzilla.suse.com/1225158", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47364", }, { cve: "CVE-2021-47365", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47365", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nafs: Fix page leak\n\nThere's a loop in afs_extend_writeback() that adds extra pages to a write\nwe want to make to improve the efficiency of the writeback by making it\nlarger. This loop stops, however, if we hit a page we can't write back\nfrom immediately, but it doesn't get rid of the page ref we speculatively\nacquired.\n\nThis was caused by the removal of the cleanup loop when the code switched\nfrom using find_get_pages_contig() to xarray scanning as the latter only\ngets a single page at a time, not a batch.\n\nFix this by putting the page on a ref on an early break from the loop.\nUnfortunately, we can't just add that page to the pagevec we're employing\nas we'll go through that and add those pages to the RPC call.\n\nThis was found by the generic/074 test. It leaks ~4GiB of RAM each time it\nis run - which can be observed with \"top\".", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47365", url: "https://www.suse.com/security/cve/CVE-2021-47365", }, { category: "external", summary: "SUSE Bug 1224895 for CVE-2021-47365", url: "https://bugzilla.suse.com/1224895", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47365", }, { cve: "CVE-2021-47366", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47366", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nafs: Fix corruption in reads at fpos 2G-4G from an OpenAFS server\n\nAFS-3 has two data fetch RPC variants, FS.FetchData and FS.FetchData64, and\nLinux's afs client switches between them when talking to a non-YFS server\nif the read size, the file position or the sum of the two have the upper 32\nbits set of the 64-bit value.\n\nThis is a problem, however, since the file position and length fields of\nFS.FetchData are *signed* 32-bit values.\n\nFix this by capturing the capability bits obtained from the fileserver when\nit's sent an FS.GetCapabilities RPC, rather than just discarding them, and\nthen picking out the VICED_CAPABILITY_64BITFILES flag. This can then be\nused to decide whether to use FS.FetchData or FS.FetchData64 - and also\nFS.StoreData or FS.StoreData64 - rather than using upper_32_bits() to\nswitch on the parameter values.\n\nThis capabilities flag could also be used to limit the maximum size of the\nfile, but all servers must be checked for that.\n\nNote that the issue does not exist with FS.StoreData - that uses *unsigned*\n32-bit values. It's also not a problem with Auristor servers as its\nYFS.FetchData64 op uses unsigned 64-bit values.\n\nThis can be tested by cloning a git repo through an OpenAFS client to an\nOpenAFS server and then doing \"git status\" on it from a Linux afs\nclient[1]. Provided the clone has a pack file that's in the 2G-4G range,\nthe git status will show errors like:\n\n\terror: packfile .git/objects/pack/pack-5e813c51d12b6847bbc0fcd97c2bca66da50079c.pack does not match index\n\terror: packfile .git/objects/pack/pack-5e813c51d12b6847bbc0fcd97c2bca66da50079c.pack does not match index\n\nThis can be observed in the server's FileLog with something like the\nfollowing appearing:\n\nSun Aug 29 19:31:39 2021 SRXAFS_FetchData, Fid = 2303380852.491776.3263114, Host 192.168.11.201:7001, Id 1001\nSun Aug 29 19:31:39 2021 CheckRights: len=0, for host=192.168.11.201:7001\nSun Aug 29 19:31:39 2021 FetchData_RXStyle: Pos 18446744071815340032, Len 3154\nSun Aug 29 19:31:39 2021 FetchData_RXStyle: file size 2400758866\n...\nSun Aug 29 19:31:40 2021 SRXAFS_FetchData returns 5\n\nNote the file position of 18446744071815340032. This is the requested file\nposition sign-extended.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47366", url: "https://www.suse.com/security/cve/CVE-2021-47366", }, { category: "external", summary: "SUSE Bug 1225160 for CVE-2021-47366", url: "https://bugzilla.suse.com/1225160", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47366", }, { cve: "CVE-2021-47367", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47367", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-net: fix pages leaking when building skb in big mode\n\nWe try to use build_skb() if we had sufficient tailroom. But we forget\nto release the unused pages chained via private in big mode which will\nleak pages. Fixing this by release the pages after building the skb in\nbig mode.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47367", url: "https://www.suse.com/security/cve/CVE-2021-47367", }, { category: "external", summary: "SUSE Bug 1225123 for CVE-2021-47367", url: "https://bugzilla.suse.com/1225123", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47367", }, { cve: "CVE-2021-47368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47368", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nenetc: Fix illegal access when reading affinity_hint\n\nirq_set_affinity_hit() stores a reference to the cpumask_t\nparameter in the irq descriptor, and that reference can be\naccessed later from irq_affinity_hint_proc_show(). Since\nthe cpu_mask parameter passed to irq_set_affinity_hit() has\nonly temporary storage (it's on the stack memory), later\naccesses to it are illegal. Thus reads from the corresponding\nprocfs affinity_hint file can result in paging request oops.\n\nThe issue is fixed by the get_cpu_mask() helper, which provides\na permanent storage for the cpumask_t parameter.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47368", url: "https://www.suse.com/security/cve/CVE-2021-47368", }, { category: "external", summary: "SUSE Bug 1225161 for CVE-2021-47368", url: "https://bugzilla.suse.com/1225161", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47368", }, { cve: "CVE-2021-47369", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47369", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/qeth: fix NULL deref in qeth_clear_working_pool_list()\n\nWhen qeth_set_online() calls qeth_clear_working_pool_list() to roll\nback after an error exit from qeth_hardsetup_card(), we are at risk of\naccessing card->qdio.in_q before it was allocated by\nqeth_alloc_qdio_queues() via qeth_mpc_initialize().\n\nqeth_clear_working_pool_list() then dereferences NULL, and by writing to\nqueue->bufs[i].pool_entry scribbles all over the CPU's lowcore.\nResulting in a crash when those lowcore areas are used next (eg. on\nthe next machine-check interrupt).\n\nSuch a scenario would typically happen when the device is first set\nonline and its queues aren't allocated yet. An early IO error or certain\nmisconfigs (eg. mismatched transport mode, bad portno) then cause us to\nerror out from qeth_hardsetup_card() with card->qdio.in_q still being\nNULL.\n\nFix it by checking the pointer for NULL before accessing it.\n\nNote that we also have (rare) paths inside qeth_mpc_initialize() where\na configuration change can cause us to free the existing queues,\nexpecting that subsequent code will allocate them again. If we then\nerror out before that re-allocation happens, the same bug occurs.\n\nRoot-caused-by: Heiko Carstens <hca@linux.ibm.com>", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47369", url: "https://www.suse.com/security/cve/CVE-2021-47369", }, { category: "external", summary: "SUSE Bug 1225164 for CVE-2021-47369", url: "https://bugzilla.suse.com/1225164", }, { category: "external", summary: "SUSE Bug 1227324 for CVE-2021-47369", url: "https://bugzilla.suse.com/1227324", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47369", }, { cve: "CVE-2021-47370", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47370", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: ensure tx skbs always have the MPTCP ext\n\nDue to signed/unsigned comparison, the expression:\n\n\tinfo->size_goal - skb->len > 0\n\nevaluates to true when the size goal is smaller than the\nskb size. That results in lack of tx cache refill, so that\nthe skb allocated by the core TCP code lacks the required\nMPTCP skb extensions.\n\nDue to the above, syzbot is able to trigger the following WARN_ON():\n\nWARNING: CPU: 1 PID: 810 at net/mptcp/protocol.c:1366 mptcp_sendmsg_frag+0x1362/0x1bc0 net/mptcp/protocol.c:1366\nModules linked in:\nCPU: 1 PID: 810 Comm: syz-executor.4 Not tainted 5.14.0-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:mptcp_sendmsg_frag+0x1362/0x1bc0 net/mptcp/protocol.c:1366\nCode: ff 4c 8b 74 24 50 48 8b 5c 24 58 e9 0f fb ff ff e8 13 44 8b f8 4c 89 e7 45 31 ed e8 98 57 2e fe e9 81 f4 ff ff e8 fe 43 8b f8 <0f> 0b 41 bd ea ff ff ff e9 6f f4 ff ff 4c 89 e7 e8 b9 8e d2 f8 e9\nRSP: 0018:ffffc9000531f6a0 EFLAGS: 00010216\nRAX: 000000000000697f RBX: 0000000000000000 RCX: ffffc90012107000\nRDX: 0000000000040000 RSI: ffffffff88eac9e2 RDI: 0000000000000003\nRBP: ffff888078b15780 R08: 0000000000000000 R09: 0000000000000000\nR10: ffffffff88eac017 R11: 0000000000000000 R12: ffff88801de0a280\nR13: 0000000000006b58 R14: ffff888066278280 R15: ffff88803c2fe9c0\nFS: 00007fd9f866e700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007faebcb2f718 CR3: 00000000267cb000 CR4: 00000000001506e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n __mptcp_push_pending+0x1fb/0x6b0 net/mptcp/protocol.c:1547\n mptcp_release_cb+0xfe/0x210 net/mptcp/protocol.c:3003\n release_sock+0xb4/0x1b0 net/core/sock.c:3206\n sk_stream_wait_memory+0x604/0xed0 net/core/stream.c:145\n mptcp_sendmsg+0xc39/0x1bc0 net/mptcp/protocol.c:1749\n inet6_sendmsg+0x99/0xe0 net/ipv6/af_inet6.c:643\n sock_sendmsg_nosec net/socket.c:704 [inline]\n sock_sendmsg+0xcf/0x120 net/socket.c:724\n sock_write_iter+0x2a0/0x3e0 net/socket.c:1057\n call_write_iter include/linux/fs.h:2163 [inline]\n new_sync_write+0x40b/0x640 fs/read_write.c:507\n vfs_write+0x7cf/0xae0 fs/read_write.c:594\n ksys_write+0x1ee/0x250 fs/read_write.c:647\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x4665f9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fd9f866e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665f9\nRDX: 00000000000e7b78 RSI: 0000000020000000 RDI: 0000000000000003\nRBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c038\nR13: 0000000000a9fb1f R14: 00007fd9f866e300 R15: 0000000000022000\n\nFix the issue rewriting the relevant expression to avoid\nsign-related problems - note: size_goal is always >= 0.\n\nAdditionally, ensure that the skb in the tx cache always carries\nthe relevant extension.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47370", url: "https://www.suse.com/security/cve/CVE-2021-47370", }, { category: "external", summary: "SUSE Bug 1225183 for CVE-2021-47370", url: "https://bugzilla.suse.com/1225183", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47370", }, { cve: "CVE-2021-47371", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47371", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Fix memory leaks in nexthop notification chain listeners\n\nsyzkaller discovered memory leaks [1] that can be reduced to the\nfollowing commands:\n\n # ip nexthop add id 1 blackhole\n # devlink dev reload pci/0000:06:00.0\n\nAs part of the reload flow, mlxsw will unregister its netdevs and then\nunregister from the nexthop notification chain. Before unregistering\nfrom the notification chain, mlxsw will receive delete notifications for\nnexthop objects using netdevs registered by mlxsw or their uppers. mlxsw\nwill not receive notifications for nexthops using netdevs that are not\ndismantled as part of the reload flow. For example, the blackhole\nnexthop above that internally uses the loopback netdev as its nexthop\ndevice.\n\nOne way to fix this problem is to have listeners flush their nexthop\ntables after unregistering from the notification chain. This is\nerror-prone as evident by this patch and also not symmetric with the\nregistration path where a listener receives a dump of all the existing\nnexthops.\n\nTherefore, fix this problem by replaying delete notifications for the\nlistener being unregistered. This is symmetric to the registration path\nand also consistent with the netdev notification chain.\n\nThe above means that unregister_nexthop_notifier(), like\nregister_nexthop_notifier(), will have to take RTNL in order to iterate\nover the existing nexthops and that any callers of the function cannot\nhold RTNL. This is true for mlxsw and netdevsim, but not for the VXLAN\ndriver. To avoid a deadlock, change the latter to unregister its nexthop\nlistener without holding RTNL, making it symmetric to the registration\npath.\n\n[1]\nunreferenced object 0xffff88806173d600 (size 512):\n comm \"syz-executor.0\", pid 1290, jiffies 4295583142 (age 143.507s)\n hex dump (first 32 bytes):\n 41 9d 1e 60 80 88 ff ff 08 d6 73 61 80 88 ff ff A..`......sa....\n 08 d6 73 61 80 88 ff ff 01 00 00 00 00 00 00 00 ..sa............\n backtrace:\n [<ffffffff81a6b576>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline]\n [<ffffffff81a6b576>] slab_post_alloc_hook+0x96/0x490 mm/slab.h:522\n [<ffffffff81a716d3>] slab_alloc_node mm/slub.c:3206 [inline]\n [<ffffffff81a716d3>] slab_alloc mm/slub.c:3214 [inline]\n [<ffffffff81a716d3>] kmem_cache_alloc_trace+0x163/0x370 mm/slub.c:3231\n [<ffffffff82e8681a>] kmalloc include/linux/slab.h:591 [inline]\n [<ffffffff82e8681a>] kzalloc include/linux/slab.h:721 [inline]\n [<ffffffff82e8681a>] mlxsw_sp_nexthop_obj_group_create drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:4918 [inline]\n [<ffffffff82e8681a>] mlxsw_sp_nexthop_obj_new drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:5054 [inline]\n [<ffffffff82e8681a>] mlxsw_sp_nexthop_obj_event+0x59a/0x2910 drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:5239\n [<ffffffff813ef67d>] notifier_call_chain+0xbd/0x210 kernel/notifier.c:83\n [<ffffffff813f0662>] blocking_notifier_call_chain kernel/notifier.c:318 [inline]\n [<ffffffff813f0662>] blocking_notifier_call_chain+0x72/0xa0 kernel/notifier.c:306\n [<ffffffff8384b9c6>] call_nexthop_notifiers+0x156/0x310 net/ipv4/nexthop.c:244\n [<ffffffff83852bd8>] insert_nexthop net/ipv4/nexthop.c:2336 [inline]\n [<ffffffff83852bd8>] nexthop_add net/ipv4/nexthop.c:2644 [inline]\n [<ffffffff83852bd8>] rtm_new_nexthop+0x14e8/0x4d10 net/ipv4/nexthop.c:2913\n [<ffffffff833e9a78>] rtnetlink_rcv_msg+0x448/0xbf0 net/core/rtnetlink.c:5572\n [<ffffffff83608703>] netlink_rcv_skb+0x173/0x480 net/netlink/af_netlink.c:2504\n [<ffffffff833de032>] rtnetlink_rcv+0x22/0x30 net/core/rtnetlink.c:5590\n [<ffffffff836069de>] netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]\n [<ffffffff836069de>] netlink_unicast+0x5ae/0x7f0 net/netlink/af_netlink.c:1340\n [<ffffffff83607501>] netlink_sendmsg+0x8e1/0xe30 net/netlink/af_netlink.c:1929\n [<ffffffff832fde84>] sock_sendmsg_nosec net/socket.c:704 [inline\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47371", url: "https://www.suse.com/security/cve/CVE-2021-47371", }, { category: "external", summary: "SUSE Bug 1225167 for CVE-2021-47371", url: "https://bugzilla.suse.com/1225167", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47371", }, { cve: "CVE-2021-47372", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47372", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix use after free on rmmod\n\nplat_dev->dev->platform_data is released by platform_device_unregister(),\nuse of pclk and hclk is a use-after-free. Since device unregister won't\nneed a clk device we adjust the function call sequence to fix this issue.\n\n[ 31.261225] BUG: KASAN: use-after-free in macb_remove+0x77/0xc6 [macb_pci]\n[ 31.275563] Freed by task 306:\n[ 30.276782] platform_device_release+0x25/0x80", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47372", url: "https://www.suse.com/security/cve/CVE-2021-47372", }, { category: "external", summary: "SUSE Bug 1225184 for CVE-2021-47372", url: "https://bugzilla.suse.com/1225184", }, { category: "external", summary: "SUSE Bug 1229946 for CVE-2021-47372", url: "https://bugzilla.suse.com/1229946", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2021-47372", }, { cve: "CVE-2021-47373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47373", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/gic-v3-its: Fix potential VPE leak on error\n\nIn its_vpe_irq_domain_alloc, when its_vpe_init() returns an error,\nthere is an off-by-one in the number of VPEs to be freed.\n\nFix it by simply passing the number of VPEs allocated, which is the\nindex of the loop iterating over the VPEs.\n\n[maz: fixed commit message]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47373", url: "https://www.suse.com/security/cve/CVE-2021-47373", }, { category: "external", summary: "SUSE Bug 1225190 for CVE-2021-47373", url: "https://bugzilla.suse.com/1225190", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47373", }, { cve: "CVE-2021-47374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47374", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndma-debug: prevent an error message from causing runtime problems\n\nFor some drivers, that use the DMA API. This error message can be reached\nseveral millions of times per second, causing spam to the kernel's printk\nbuffer and bringing the CPU usage up to 100% (so, it should be rate\nlimited). However, since there is at least one driver that is in the\nmainline and suffers from the error condition, it is more useful to\nerr_printk() here instead of just rate limiting the error message (in hopes\nthat it will make it easier for other drivers that suffer from this issue\nto be spotted).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47374", url: "https://www.suse.com/security/cve/CVE-2021-47374", }, { category: "external", summary: "SUSE Bug 1225191 for CVE-2021-47374", url: "https://bugzilla.suse.com/1225191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47374", }, { cve: "CVE-2021-47375", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47375", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nblktrace: Fix uaf in blk_trace access after removing by sysfs\n\nThere is an use-after-free problem triggered by following process:\n\n P1(sda)\t\t\t\tP2(sdb)\n\t\t\techo 0 > /sys/block/sdb/trace/enable\n\t\t\t blk_trace_remove_queue\n\t\t\t synchronize_rcu\n\t\t\t blk_trace_free\n\t\t\t relay_close\nrcu_read_lock\n__blk_add_trace\n trace_note_tsk\n (Iterate running_trace_list)\n\t\t\t relay_close_buf\n\t\t\t\t relay_destroy_buf\n\t\t\t\t kfree(buf)\n trace_note(sdb's bt)\n relay_reserve\n buf->offset <- nullptr deference (use-after-free) !!!\nrcu_read_unlock\n\n[ 502.714379] BUG: kernel NULL pointer dereference, address:\n0000000000000010\n[ 502.715260] #PF: supervisor read access in kernel mode\n[ 502.715903] #PF: error_code(0x0000) - not-present page\n[ 502.716546] PGD 103984067 P4D 103984067 PUD 17592b067 PMD 0\n[ 502.717252] Oops: 0000 [#1] SMP\n[ 502.720308] RIP: 0010:trace_note.isra.0+0x86/0x360\n[ 502.732872] Call Trace:\n[ 502.733193] __blk_add_trace.cold+0x137/0x1a3\n[ 502.733734] blk_add_trace_rq+0x7b/0xd0\n[ 502.734207] blk_add_trace_rq_issue+0x54/0xa0\n[ 502.734755] blk_mq_start_request+0xde/0x1b0\n[ 502.735287] scsi_queue_rq+0x528/0x1140\n...\n[ 502.742704] sg_new_write.isra.0+0x16e/0x3e0\n[ 502.747501] sg_ioctl+0x466/0x1100\n\nReproduce method:\n ioctl(/dev/sda, BLKTRACESETUP, blk_user_trace_setup[buf_size=127])\n ioctl(/dev/sda, BLKTRACESTART)\n ioctl(/dev/sdb, BLKTRACESETUP, blk_user_trace_setup[buf_size=127])\n ioctl(/dev/sdb, BLKTRACESTART)\n\n echo 0 > /sys/block/sdb/trace/enable &\n // Add delay(mdelay/msleep) before kernel enters blk_trace_free()\n\n ioctl$SG_IO(/dev/sda, SG_IO, ...)\n // Enters trace_note_tsk() after blk_trace_free() returned\n // Use mdelay in rcu region rather than msleep(which may schedule out)\n\nRemove blk_trace from running_list before calling blk_trace_free() by\nsysfs if blk_trace is at Blktrace_running state.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47375", url: "https://www.suse.com/security/cve/CVE-2021-47375", }, { category: "external", summary: "SUSE Bug 1225193 for CVE-2021-47375", url: "https://bugzilla.suse.com/1225193", }, { category: "external", summary: "SUSE Bug 1225194 for CVE-2021-47375", url: "https://bugzilla.suse.com/1225194", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2021-47375", }, { cve: "CVE-2021-47376", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47376", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Add oversize check before call kvcalloc()\n\nCommit 7661809d493b (\"mm: don't allow oversized kvmalloc() calls\") add the\noversize check. When the allocation is larger than what kmalloc() supports,\nthe following warning triggered:\n\nWARNING: CPU: 0 PID: 8408 at mm/util.c:597 kvmalloc_node+0x108/0x110 mm/util.c:597\nModules linked in:\nCPU: 0 PID: 8408 Comm: syz-executor221 Not tainted 5.14.0-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:kvmalloc_node+0x108/0x110 mm/util.c:597\nCall Trace:\n kvmalloc include/linux/mm.h:806 [inline]\n kvmalloc_array include/linux/mm.h:824 [inline]\n kvcalloc include/linux/mm.h:829 [inline]\n check_btf_line kernel/bpf/verifier.c:9925 [inline]\n check_btf_info kernel/bpf/verifier.c:10049 [inline]\n bpf_check+0xd634/0x150d0 kernel/bpf/verifier.c:13759\n bpf_prog_load kernel/bpf/syscall.c:2301 [inline]\n __sys_bpf+0x11181/0x126e0 kernel/bpf/syscall.c:4587\n __do_sys_bpf kernel/bpf/syscall.c:4691 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:4689 [inline]\n __x64_sys_bpf+0x78/0x90 kernel/bpf/syscall.c:4689\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47376", url: "https://www.suse.com/security/cve/CVE-2021-47376", }, { category: "external", summary: "SUSE Bug 1225195 for CVE-2021-47376", url: "https://bugzilla.suse.com/1225195", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47376", }, { cve: "CVE-2021-47378", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47378", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-rdma: destroy cm id before destroy qp to avoid use after free\n\nWe should always destroy cm_id before destroy qp to avoid to get cma\nevent after qp was destroyed, which may lead to use after free.\nIn RDMA connection establishment error flow, don't destroy qp in cm\nevent handler.Just report cm_error to upper level, qp will be destroy\nin nvme_rdma_alloc_queue() after destroy cm id.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47378", url: "https://www.suse.com/security/cve/CVE-2021-47378", }, { category: "external", summary: "SUSE Bug 1225201 for CVE-2021-47378", url: "https://bugzilla.suse.com/1225201", }, { category: "external", summary: "SUSE Bug 1225202 for CVE-2021-47378", url: "https://bugzilla.suse.com/1225202", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2021-47378", }, { cve: "CVE-2021-47379", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47379", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd\n\nKASAN reports a use-after-free report when doing fuzz test:\n\n[693354.104835] ==================================================================\n[693354.105094] BUG: KASAN: use-after-free in bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105336] Read of size 4 at addr ffff888be0a35664 by task sh/1453338\n\n[693354.105607] CPU: 41 PID: 1453338 Comm: sh Kdump: loaded Not tainted 4.18.0-147\n[693354.105610] Hardware name: Huawei 2288H V5/BC11SPSCB0, BIOS 0.81 07/02/2018\n[693354.105612] Call Trace:\n[693354.105621] dump_stack+0xf1/0x19b\n[693354.105626] ? show_regs_print_info+0x5/0x5\n[693354.105634] ? printk+0x9c/0xc3\n[693354.105638] ? cpumask_weight+0x1f/0x1f\n[693354.105648] print_address_description+0x70/0x360\n[693354.105654] kasan_report+0x1b2/0x330\n[693354.105659] ? bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105665] ? bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105670] bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105675] ? bfq_cpd_init+0x20/0x20\n[693354.105683] cgroup_file_write+0x3aa/0x510\n[693354.105693] ? ___slab_alloc+0x507/0x540\n[693354.105698] ? cgroup_file_poll+0x60/0x60\n[693354.105702] ? 0xffffffff89600000\n[693354.105708] ? usercopy_abort+0x90/0x90\n[693354.105716] ? mutex_lock+0xef/0x180\n[693354.105726] kernfs_fop_write+0x1ab/0x280\n[693354.105732] ? cgroup_file_poll+0x60/0x60\n[693354.105738] vfs_write+0xe7/0x230\n[693354.105744] ksys_write+0xb0/0x140\n[693354.105749] ? __ia32_sys_read+0x50/0x50\n[693354.105760] do_syscall_64+0x112/0x370\n[693354.105766] ? syscall_return_slowpath+0x260/0x260\n[693354.105772] ? do_page_fault+0x9b/0x270\n[693354.105779] ? prepare_exit_to_usermode+0xf9/0x1a0\n[693354.105784] ? enter_from_user_mode+0x30/0x30\n[693354.105793] entry_SYSCALL_64_after_hwframe+0x65/0xca\n\n[693354.105875] Allocated by task 1453337:\n[693354.106001] kasan_kmalloc+0xa0/0xd0\n[693354.106006] kmem_cache_alloc_node_trace+0x108/0x220\n[693354.106010] bfq_pd_alloc+0x96/0x120\n[693354.106015] blkcg_activate_policy+0x1b7/0x2b0\n[693354.106020] bfq_create_group_hierarchy+0x1e/0x80\n[693354.106026] bfq_init_queue+0x678/0x8c0\n[693354.106031] blk_mq_init_sched+0x1f8/0x460\n[693354.106037] elevator_switch_mq+0xe1/0x240\n[693354.106041] elevator_switch+0x25/0x40\n[693354.106045] elv_iosched_store+0x1a1/0x230\n[693354.106049] queue_attr_store+0x78/0xb0\n[693354.106053] kernfs_fop_write+0x1ab/0x280\n[693354.106056] vfs_write+0xe7/0x230\n[693354.106060] ksys_write+0xb0/0x140\n[693354.106064] do_syscall_64+0x112/0x370\n[693354.106069] entry_SYSCALL_64_after_hwframe+0x65/0xca\n\n[693354.106114] Freed by task 1453336:\n[693354.106225] __kasan_slab_free+0x130/0x180\n[693354.106229] kfree+0x90/0x1b0\n[693354.106233] blkcg_deactivate_policy+0x12c/0x220\n[693354.106238] bfq_exit_queue+0xf5/0x110\n[693354.106241] blk_mq_exit_sched+0x104/0x130\n[693354.106245] __elevator_exit+0x45/0x60\n[693354.106249] elevator_switch_mq+0xd6/0x240\n[693354.106253] elevator_switch+0x25/0x40\n[693354.106257] elv_iosched_store+0x1a1/0x230\n[693354.106261] queue_attr_store+0x78/0xb0\n[693354.106264] kernfs_fop_write+0x1ab/0x280\n[693354.106268] vfs_write+0xe7/0x230\n[693354.106271] ksys_write+0xb0/0x140\n[693354.106275] do_syscall_64+0x112/0x370\n[693354.106280] entry_SYSCALL_64_after_hwframe+0x65/0xca\n\n[693354.106329] The buggy address belongs to the object at ffff888be0a35580\n which belongs to the cache kmalloc-1k of size 1024\n[693354.106736] The buggy address is located 228 bytes inside of\n 1024-byte region [ffff888be0a35580, ffff888be0a35980)\n[693354.107114] The buggy address belongs to the page:\n[693354.107273] page:ffffea002f828c00 count:1 mapcount:0 mapping:ffff888107c17080 index:0x0 compound_mapcount: 0\n[693354.107606] flags: 0x17ffffc0008100(slab|head)\n[693354.107760] raw: 0017ffffc0008100 ffffea002fcbc808 ffffea0030bd3a08 ffff888107c17080\n[693354.108020] r\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47379", url: "https://www.suse.com/security/cve/CVE-2021-47379", }, { category: "external", summary: "SUSE Bug 1225203 for CVE-2021-47379", url: "https://bugzilla.suse.com/1225203", }, { category: "external", summary: "SUSE Bug 1225204 for CVE-2021-47379", url: "https://bugzilla.suse.com/1225204", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47379", }, { cve: "CVE-2021-47380", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47380", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: amd_sfh: Fix potential NULL pointer dereference\n\ndevm_add_action_or_reset() can suddenly invoke amd_mp2_pci_remove() at\nregistration that will cause NULL pointer dereference since\ncorresponding data is not initialized yet. The patch moves\ninitialization of data before devm_add_action_or_reset().\n\nFound by Linux Driver Verification project (linuxtesting.org).\n\n[jkosina@suse.cz: rebase]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47380", url: "https://www.suse.com/security/cve/CVE-2021-47380", }, { category: "external", summary: "SUSE Bug 1225205 for CVE-2021-47380", url: "https://bugzilla.suse.com/1225205", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47380", }, { cve: "CVE-2021-47381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47381", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SOF: Fix DSP oops stack dump output contents\n\nFix @buf arg given to hex_dump_to_buffer() and stack address used\nin dump error output.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47381", url: "https://www.suse.com/security/cve/CVE-2021-47381", }, { category: "external", summary: "SUSE Bug 1225206 for CVE-2021-47381", url: "https://bugzilla.suse.com/1225206", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47381", }, { cve: "CVE-2021-47382", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47382", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/qeth: fix deadlock during failing recovery\n\nCommit 0b9902c1fcc5 (\"s390/qeth: fix deadlock during recovery\") removed\ntaking discipline_mutex inside qeth_do_reset(), fixing potential\ndeadlocks. An error path was missed though, that still takes\ndiscipline_mutex and thus has the original deadlock potential.\n\nIntermittent deadlocks were seen when a qeth channel path is configured\noffline, causing a race between qeth_do_reset and ccwgroup_remove.\nCall qeth_set_offline() directly in the qeth_do_reset() error case and\nthen a new variant of ccwgroup_set_offline(), without taking\ndiscipline_mutex.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47382", url: "https://www.suse.com/security/cve/CVE-2021-47382", }, { category: "external", summary: "SUSE Bug 1225207 for CVE-2021-47382", url: "https://bugzilla.suse.com/1225207", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47382", }, { cve: "CVE-2021-47383", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47383", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: Fix out-of-bound vmalloc access in imageblit\n\nThis issue happens when a userspace program does an ioctl\nFBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct\ncontaining only the fields xres, yres, and bits_per_pixel\nwith values.\n\nIf this struct is the same as the previous ioctl, the\nvc_resize() detects it and doesn't call the resize_screen(),\nleaving the fb_var_screeninfo incomplete. And this leads to\nthe updatescrollmode() calculates a wrong value to\nfbcon_display->vrows, which makes the real_y() return a\nwrong value of y, and that value, eventually, causes\nthe imageblit to access an out-of-bound address value.\n\nTo solve this issue I made the resize_screen() be called\neven if the screen does not need any resizing, so it will\n\"fix and fill\" the fb_var_screeninfo independently.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47383", url: "https://www.suse.com/security/cve/CVE-2021-47383", }, { category: "external", summary: "SUSE Bug 1225208 for CVE-2021-47383", url: "https://bugzilla.suse.com/1225208", }, { category: "external", summary: "SUSE Bug 1225211 for CVE-2021-47383", url: "https://bugzilla.suse.com/1225211", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2021-47383", }, { cve: "CVE-2021-47384", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47384", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field\n\nIf driver read tmp value sufficient for\n(tmp & 0x08) && (!(tmp & 0x80)) && ((tmp & 0x7) == ((tmp >> 4) & 0x7))\nfrom device then Null pointer dereference occurs.\n(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)\nAlso lm75[] does not serve a purpose anymore after switching to\ndevm_i2c_new_dummy_device() in w83791d_detect_subclients().\n\nThe patch fixes possible NULL pointer dereference by removing lm75[].\n\nFound by Linux Driver Verification project (linuxtesting.org).\n\n[groeck: Dropped unnecessary continuation lines, fixed multi-line alignments]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47384", url: "https://www.suse.com/security/cve/CVE-2021-47384", }, { category: "external", summary: "SUSE Bug 1225209 for CVE-2021-47384", url: "https://bugzilla.suse.com/1225209", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47384", }, { cve: "CVE-2021-47385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47385", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field\n\nIf driver read val value sufficient for\n(val & 0x08) && (!(val & 0x80)) && ((val & 0x7) == ((val >> 4) & 0x7))\nfrom device then Null pointer dereference occurs.\n(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)\nAlso lm75[] does not serve a purpose anymore after switching to\ndevm_i2c_new_dummy_device() in w83791d_detect_subclients().\n\nThe patch fixes possible NULL pointer dereference by removing lm75[].\n\nFound by Linux Driver Verification project (linuxtesting.org).\n\n[groeck: Dropped unnecessary continuation lines, fixed multipline alignment]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47385", url: "https://www.suse.com/security/cve/CVE-2021-47385", }, { category: "external", summary: "SUSE Bug 1225210 for CVE-2021-47385", url: "https://bugzilla.suse.com/1225210", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47385", }, { cve: "CVE-2021-47386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47386", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field\n\nIf driver read val value sufficient for\n(val & 0x08) && (!(val & 0x80)) && ((val & 0x7) == ((val >> 4) & 0x7))\nfrom device then Null pointer dereference occurs.\n(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)\nAlso lm75[] does not serve a purpose anymore after switching to\ndevm_i2c_new_dummy_device() in w83791d_detect_subclients().\n\nThe patch fixes possible NULL pointer dereference by removing lm75[].\n\nFound by Linux Driver Verification project (linuxtesting.org).\n\n[groeck: Dropped unnecessary continuation lines, fixed multi-line alignment]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47386", url: "https://www.suse.com/security/cve/CVE-2021-47386", }, { category: "external", summary: "SUSE Bug 1225268 for CVE-2021-47386", url: "https://bugzilla.suse.com/1225268", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47386", }, { cve: "CVE-2021-47387", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47387", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: schedutil: Use kobject release() method to free sugov_tunables\n\nThe struct sugov_tunables is protected by the kobject, so we can't free\nit directly. Otherwise we would get a call trace like this:\n ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x30\n WARNING: CPU: 3 PID: 720 at lib/debugobjects.c:505 debug_print_object+0xb8/0x100\n Modules linked in:\n CPU: 3 PID: 720 Comm: a.sh Tainted: G W 5.14.0-rc1-next-20210715-yocto-standard+ #507\n Hardware name: Marvell OcteonTX CN96XX board (DT)\n pstate: 40400009 (nZcv daif +PAN -UAO -TCO BTYPE=--)\n pc : debug_print_object+0xb8/0x100\n lr : debug_print_object+0xb8/0x100\n sp : ffff80001ecaf910\n x29: ffff80001ecaf910 x28: ffff00011b10b8d0 x27: ffff800011043d80\n x26: ffff00011a8f0000 x25: ffff800013cb3ff0 x24: 0000000000000000\n x23: ffff80001142aa68 x22: ffff800011043d80 x21: ffff00010de46f20\n x20: ffff800013c0c520 x19: ffff800011d8f5b0 x18: 0000000000000010\n x17: 6e6968207473696c x16: 5f72656d6974203a x15: 6570797420746365\n x14: 6a626f2029302065 x13: 303378302f307830 x12: 2b6e665f72656d69\n x11: ffff8000124b1560 x10: ffff800012331520 x9 : ffff8000100ca6b0\n x8 : 000000000017ffe8 x7 : c0000000fffeffff x6 : 0000000000000001\n x5 : ffff800011d8c000 x4 : ffff800011d8c740 x3 : 0000000000000000\n x2 : ffff0001108301c0 x1 : ab3c90eedf9c0f00 x0 : 0000000000000000\n Call trace:\n debug_print_object+0xb8/0x100\n __debug_check_no_obj_freed+0x1c0/0x230\n debug_check_no_obj_freed+0x20/0x88\n slab_free_freelist_hook+0x154/0x1c8\n kfree+0x114/0x5d0\n sugov_exit+0xbc/0xc0\n cpufreq_exit_governor+0x44/0x90\n cpufreq_set_policy+0x268/0x4a8\n store_scaling_governor+0xe0/0x128\n store+0xc0/0xf0\n sysfs_kf_write+0x54/0x80\n kernfs_fop_write_iter+0x128/0x1c0\n new_sync_write+0xf0/0x190\n vfs_write+0x2d4/0x478\n ksys_write+0x74/0x100\n __arm64_sys_write+0x24/0x30\n invoke_syscall.constprop.0+0x54/0xe0\n do_el0_svc+0x64/0x158\n el0_svc+0x2c/0xb0\n el0t_64_sync_handler+0xb0/0xb8\n el0t_64_sync+0x198/0x19c\n irq event stamp: 5518\n hardirqs last enabled at (5517): [<ffff8000100cbd7c>] console_unlock+0x554/0x6c8\n hardirqs last disabled at (5518): [<ffff800010fc0638>] el1_dbg+0x28/0xa0\n softirqs last enabled at (5504): [<ffff8000100106e0>] __do_softirq+0x4d0/0x6c0\n softirqs last disabled at (5483): [<ffff800010049548>] irq_exit+0x1b0/0x1b8\n\nSo split the original sugov_tunables_free() into two functions,\nsugov_clear_global_tunables() is just used to clear the global_tunables\nand the new sugov_tunables_free() is used as kobj_type::release to\nrelease the sugov_tunables safely.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47387", url: "https://www.suse.com/security/cve/CVE-2021-47387", }, { category: "external", summary: "SUSE Bug 1225316 for CVE-2021-47387", url: "https://bugzilla.suse.com/1225316", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47387", }, { cve: "CVE-2021-47388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47388", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmac80211: fix use-after-free in CCMP/GCMP RX\n\nWhen PN checking is done in mac80211, for fragmentation we need\nto copy the PN to the RX struct so we can later use it to do a\ncomparison, since commit bf30ca922a0c (\"mac80211: check defrag\nPN against current frame\").\n\nUnfortunately, in that commit I used the 'hdr' variable without\nit being necessarily valid, so use-after-free could occur if it\nwas necessary to reallocate (parts of) the frame.\n\nFix this by reloading the variable after the code that results\nin the reallocations, if any.\n\nThis fixes https://bugzilla.kernel.org/show_bug.cgi?id=214401.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47388", url: "https://www.suse.com/security/cve/CVE-2021-47388", }, { category: "external", summary: "SUSE Bug 1225214 for CVE-2021-47388", url: "https://bugzilla.suse.com/1225214", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47388", }, { cve: "CVE-2021-47389", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47389", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: fix missing sev_decommission in sev_receive_start\n\nDECOMMISSION the current SEV context if binding an ASID fails after\nRECEIVE_START. Per AMD's SEV API, RECEIVE_START generates a new guest\ncontext and thus needs to be paired with DECOMMISSION:\n\n The RECEIVE_START command is the only command other than the LAUNCH_START\n command that generates a new guest context and guest handle.\n\nThe missing DECOMMISSION can result in subsequent SEV launch failures,\nas the firmware leaks memory and might not able to allocate more SEV\nguest contexts in the future.\n\nNote, LAUNCH_START suffered the same bug, but was previously fixed by\ncommit 934002cd660b (\"KVM: SVM: Call SEV Guest Decommission if ASID\nbinding fails\").", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47389", url: "https://www.suse.com/security/cve/CVE-2021-47389", }, { category: "external", summary: "SUSE Bug 1225126 for CVE-2021-47389", url: "https://bugzilla.suse.com/1225126", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47389", }, { cve: "CVE-2021-47390", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47390", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Fix stack-out-of-bounds memory access from ioapic_write_indirect()\n\nKASAN reports the following issue:\n\n BUG: KASAN: stack-out-of-bounds in kvm_make_vcpus_request_mask+0x174/0x440 [kvm]\n Read of size 8 at addr ffffc9001364f638 by task qemu-kvm/4798\n\n CPU: 0 PID: 4798 Comm: qemu-kvm Tainted: G X --------- ---\n Hardware name: AMD Corporation DAYTONA_X/DAYTONA_X, BIOS RYM0081C 07/13/2020\n Call Trace:\n dump_stack+0xa5/0xe6\n print_address_description.constprop.0+0x18/0x130\n ? kvm_make_vcpus_request_mask+0x174/0x440 [kvm]\n __kasan_report.cold+0x7f/0x114\n ? kvm_make_vcpus_request_mask+0x174/0x440 [kvm]\n kasan_report+0x38/0x50\n kasan_check_range+0xf5/0x1d0\n kvm_make_vcpus_request_mask+0x174/0x440 [kvm]\n kvm_make_scan_ioapic_request_mask+0x84/0xc0 [kvm]\n ? kvm_arch_exit+0x110/0x110 [kvm]\n ? sched_clock+0x5/0x10\n ioapic_write_indirect+0x59f/0x9e0 [kvm]\n ? static_obj+0xc0/0xc0\n ? __lock_acquired+0x1d2/0x8c0\n ? kvm_ioapic_eoi_inject_work+0x120/0x120 [kvm]\n\nThe problem appears to be that 'vcpu_bitmap' is allocated as a single long\non stack and it should really be KVM_MAX_VCPUS long. We also seem to clear\nthe lower 16 bits of it with bitmap_zero() for no particular reason (my\nguess would be that 'bitmap' and 'vcpu_bitmap' variables in\nkvm_bitmap_or_dest_vcpus() caused the confusion: while the later is indeed\n16-bit long, the later should accommodate all possible vCPUs).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47390", url: "https://www.suse.com/security/cve/CVE-2021-47390", }, { category: "external", summary: "SUSE Bug 1225125 for CVE-2021-47390", url: "https://bugzilla.suse.com/1225125", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47390", }, { cve: "CVE-2021-47391", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47391", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests\n\nThe FSM can run in a circle allowing rdma_resolve_ip() to be called twice\non the same id_priv. While this cannot happen without going through the\nwork, it violates the invariant that the same address resolution\nbackground request cannot be active twice.\n\n CPU 1 CPU 2\n\nrdma_resolve_addr():\n RDMA_CM_IDLE -> RDMA_CM_ADDR_QUERY\n rdma_resolve_ip(addr_handler) #1\n\n\t\t\t process_one_req(): for #1\n addr_handler():\n RDMA_CM_ADDR_QUERY -> RDMA_CM_ADDR_BOUND\n mutex_unlock(&id_priv->handler_mutex);\n [.. handler still running ..]\n\nrdma_resolve_addr():\n RDMA_CM_ADDR_BOUND -> RDMA_CM_ADDR_QUERY\n rdma_resolve_ip(addr_handler)\n !! two requests are now on the req_list\n\nrdma_destroy_id():\n destroy_id_handler_unlock():\n _destroy_id():\n cma_cancel_operation():\n rdma_addr_cancel()\n\n // process_one_req() self removes it\n\t\t spin_lock_bh(&lock);\n cancel_delayed_work(&req->work);\n\t if (!list_empty(&req->list)) == true\n\n ! rdma_addr_cancel() returns after process_on_req #1 is done\n\n kfree(id_priv)\n\n\t\t\t process_one_req(): for #2\n addr_handler():\n\t mutex_lock(&id_priv->handler_mutex);\n !! Use after free on id_priv\n\nrdma_addr_cancel() expects there to be one req on the list and only\ncancels the first one. The self-removal behavior of the work only happens\nafter the handler has returned. This yields a situations where the\nreq_list can have two reqs for the same \"handle\" but rdma_addr_cancel()\nonly cancels the first one.\n\nThe second req remains active beyond rdma_destroy_id() and will\nuse-after-free id_priv once it inevitably triggers.\n\nFix this by remembering if the id_priv has called rdma_resolve_ip() and\nalways cancel before calling it again. This ensures the req_list never\ngets more than one item in it and doesn't cost anything in the normal flow\nthat never uses this strange error path.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47391", url: "https://www.suse.com/security/cve/CVE-2021-47391", }, { category: "external", summary: "SUSE Bug 1225318 for CVE-2021-47391", url: "https://bugzilla.suse.com/1225318", }, { category: "external", summary: "SUSE Bug 1225319 for CVE-2021-47391", url: "https://bugzilla.suse.com/1225319", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2021-47391", }, { cve: "CVE-2021-47392", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47392", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure\n\nIf cma_listen_on_all() fails it leaves the per-device ID still on the\nlisten_list but the state is not set to RDMA_CM_ADDR_BOUND.\n\nWhen the cmid is eventually destroyed cma_cancel_listens() is not called\ndue to the wrong state, however the per-device IDs are still holding the\nrefcount preventing the ID from being destroyed, thus deadlocking:\n\n task:rping state:D stack: 0 pid:19605 ppid: 47036 flags:0x00000084\n Call Trace:\n __schedule+0x29a/0x780\n ? free_unref_page_commit+0x9b/0x110\n schedule+0x3c/0xa0\n schedule_timeout+0x215/0x2b0\n ? __flush_work+0x19e/0x1e0\n wait_for_completion+0x8d/0xf0\n _destroy_id+0x144/0x210 [rdma_cm]\n ucma_close_id+0x2b/0x40 [rdma_ucm]\n __destroy_id+0x93/0x2c0 [rdma_ucm]\n ? __xa_erase+0x4a/0xa0\n ucma_destroy_id+0x9a/0x120 [rdma_ucm]\n ucma_write+0xb8/0x130 [rdma_ucm]\n vfs_write+0xb4/0x250\n ksys_write+0xb5/0xd0\n ? syscall_trace_enter.isra.19+0x123/0x190\n do_syscall_64+0x33/0x40\n entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nEnsure that cma_listen_on_all() atomically unwinds its action under the\nlock during error.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47392", url: "https://www.suse.com/security/cve/CVE-2021-47392", }, { category: "external", summary: "SUSE Bug 1225320 for CVE-2021-47392", url: "https://bugzilla.suse.com/1225320", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47392", }, { cve: "CVE-2021-47393", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47393", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs\n\nFan speed minimum can be enforced from sysfs. For example, setting\ncurrent fan speed to 20 is used to enforce fan speed to be at 100%\nspeed, 19 - to be not below 90% speed, etcetera. This feature provides\nability to limit fan speed according to some system wise\nconsiderations, like absence of some replaceable units or high system\nambient temperature.\n\nRequest for changing fan minimum speed is configuration request and can\nbe set only through 'sysfs' write procedure. In this situation value of\nargument 'state' is above nominal fan speed maximum.\n\nReturn non-zero code in this case to avoid\nthermal_cooling_device_stats_update() call, because in this case\nstatistics update violates thermal statistics table range.\nThe issues is observed in case kernel is configured with option\nCONFIG_THERMAL_STATISTICS.\n\nHere is the trace from KASAN:\n[ 159.506659] BUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x7d/0xb0\n[ 159.516016] Read of size 4 at addr ffff888116163840 by task hw-management.s/7444\n[ 159.545625] Call Trace:\n[ 159.548366] dump_stack+0x92/0xc1\n[ 159.552084] ? thermal_cooling_device_stats_update+0x7d/0xb0\n[ 159.635869] thermal_zone_device_update+0x345/0x780\n[ 159.688711] thermal_zone_device_set_mode+0x7d/0xc0\n[ 159.694174] mlxsw_thermal_modules_init+0x48f/0x590 [mlxsw_core]\n[ 159.700972] ? mlxsw_thermal_set_cur_state+0x5a0/0x5a0 [mlxsw_core]\n[ 159.731827] mlxsw_thermal_init+0x763/0x880 [mlxsw_core]\n[ 160.070233] RIP: 0033:0x7fd995909970\n[ 160.074239] Code: 73 01 c3 48 8b 0d 28 d5 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 99 2d 2c 00 00 75 10 b8 01 00 00 00 0f 05 <48> 3d 01 f0 ff ..\n[ 160.095242] RSP: 002b:00007fff54f5d938 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 160.103722] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 00007fd995909970\n[ 160.111710] RDX: 0000000000000013 RSI: 0000000001906008 RDI: 0000000000000001\n[ 160.119699] RBP: 0000000001906008 R08: 00007fd995bc9760 R09: 00007fd996210700\n[ 160.127687] R10: 0000000000000073 R11: 0000000000000246 R12: 0000000000000013\n[ 160.135673] R13: 0000000000000001 R14: 00007fd995bc8600 R15: 0000000000000013\n[ 160.143671]\n[ 160.145338] Allocated by task 2924:\n[ 160.149242] kasan_save_stack+0x19/0x40\n[ 160.153541] __kasan_kmalloc+0x7f/0xa0\n[ 160.157743] __kmalloc+0x1a2/0x2b0\n[ 160.161552] thermal_cooling_device_setup_sysfs+0xf9/0x1a0\n[ 160.167687] __thermal_cooling_device_register+0x1b5/0x500\n[ 160.173833] devm_thermal_of_cooling_device_register+0x60/0xa0\n[ 160.180356] mlxreg_fan_probe+0x474/0x5e0 [mlxreg_fan]\n[ 160.248140]\n[ 160.249807] The buggy address belongs to the object at ffff888116163400\n[ 160.249807] which belongs to the cache kmalloc-1k of size 1024\n[ 160.263814] The buggy address is located 64 bytes to the right of\n[ 160.263814] 1024-byte region [ffff888116163400, ffff888116163800)\n[ 160.277536] The buggy address belongs to the page:\n[ 160.282898] page:0000000012275840 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888116167000 pfn:0x116160\n[ 160.294872] head:0000000012275840 order:3 compound_mapcount:0 compound_pincount:0\n[ 160.303251] flags: 0x200000000010200(slab|head|node=0|zone=2)\n[ 160.309694] raw: 0200000000010200 ffffea00046f7208 ffffea0004928208 ffff88810004dbc0\n[ 160.318367] raw: ffff888116167000 00000000000a0006 00000001ffffffff 0000000000000000\n[ 160.327033] page dumped because: kasan: bad access detected\n[ 160.333270]\n[ 160.334937] Memory state around the buggy address:\n[ 160.356469] >ffff888116163800: fc ..", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47393", url: "https://www.suse.com/security/cve/CVE-2021-47393", }, { category: "external", summary: "SUSE Bug 1225321 for CVE-2021-47393", url: "https://bugzilla.suse.com/1225321", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47393", }, { cve: "CVE-2021-47394", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47394", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: unlink table before deleting it\n\nsyzbot reports following UAF:\nBUG: KASAN: use-after-free in memcmp+0x18f/0x1c0 lib/string.c:955\n nla_strcmp+0xf2/0x130 lib/nlattr.c:836\n nft_table_lookup.part.0+0x1a2/0x460 net/netfilter/nf_tables_api.c:570\n nft_table_lookup net/netfilter/nf_tables_api.c:4064 [inline]\n nf_tables_getset+0x1b3/0x860 net/netfilter/nf_tables_api.c:4064\n nfnetlink_rcv_msg+0x659/0x13f0 net/netfilter/nfnetlink.c:285\n netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2504\n\nProblem is that all get operations are lockless, so the commit_mutex\nheld by nft_rcv_nl_event() isn't enough to stop a parallel GET request\nfrom doing read-accesses to the table object even after synchronize_rcu().\n\nTo avoid this, unlink the table first and store the table objects in\non-stack scratch space.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47394", url: "https://www.suse.com/security/cve/CVE-2021-47394", }, { category: "external", summary: "SUSE Bug 1225323 for CVE-2021-47394", url: "https://bugzilla.suse.com/1225323", }, { category: "external", summary: "SUSE Bug 1227906 for CVE-2021-47394", url: "https://bugzilla.suse.com/1227906", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47394", }, { cve: "CVE-2021-47395", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47395", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap\n\nLimit max values for vht mcs and nss in ieee80211_parse_tx_radiotap\nroutine in order to fix the following warning reported by syzbot:\n\nWARNING: CPU: 0 PID: 10717 at include/net/mac80211.h:989 ieee80211_rate_set_vht include/net/mac80211.h:989 [inline]\nWARNING: CPU: 0 PID: 10717 at include/net/mac80211.h:989 ieee80211_parse_tx_radiotap+0x101e/0x12d0 net/mac80211/tx.c:2244\nModules linked in:\nCPU: 0 PID: 10717 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:ieee80211_rate_set_vht include/net/mac80211.h:989 [inline]\nRIP: 0010:ieee80211_parse_tx_radiotap+0x101e/0x12d0 net/mac80211/tx.c:2244\nRSP: 0018:ffffc9000186f3e8 EFLAGS: 00010216\nRAX: 0000000000000618 RBX: ffff88804ef76500 RCX: ffffc900143a5000\nRDX: 0000000000040000 RSI: ffffffff888f478e RDI: 0000000000000003\nRBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000100\nR10: ffffffff888f46f9 R11: 0000000000000000 R12: 00000000fffffff8\nR13: ffff88804ef7653c R14: 0000000000000001 R15: 0000000000000004\nFS: 00007fbf5718f700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000001b2de23000 CR3: 000000006a671000 CR4: 00000000001506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600\nCall Trace:\n ieee80211_monitor_select_queue+0xa6/0x250 net/mac80211/iface.c:740\n netdev_core_pick_tx+0x169/0x2e0 net/core/dev.c:4089\n __dev_queue_xmit+0x6f9/0x3710 net/core/dev.c:4165\n __bpf_tx_skb net/core/filter.c:2114 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2139 [inline]\n __bpf_redirect+0x5ba/0xd20 net/core/filter.c:2162\n ____bpf_clone_redirect net/core/filter.c:2429 [inline]\n bpf_clone_redirect+0x2ae/0x420 net/core/filter.c:2401\n bpf_prog_eeb6f53a69e5c6a2+0x59/0x234\n bpf_dispatcher_nop_func include/linux/bpf.h:717 [inline]\n __bpf_prog_run include/linux/filter.h:624 [inline]\n bpf_prog_run include/linux/filter.h:631 [inline]\n bpf_test_run+0x381/0xa30 net/bpf/test_run.c:119\n bpf_prog_test_run_skb+0xb84/0x1ee0 net/bpf/test_run.c:663\n bpf_prog_test_run kernel/bpf/syscall.c:3307 [inline]\n __sys_bpf+0x2137/0x5df0 kernel/bpf/syscall.c:4605\n __do_sys_bpf kernel/bpf/syscall.c:4691 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:4689 [inline]\n __x64_sys_bpf+0x75/0xb0 kernel/bpf/syscall.c:4689\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x4665f9", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47395", url: "https://www.suse.com/security/cve/CVE-2021-47395", }, { category: "external", summary: "SUSE Bug 1225326 for CVE-2021-47395", url: "https://bugzilla.suse.com/1225326", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47395", }, { cve: "CVE-2021-47396", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47396", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmac80211-hwsim: fix late beacon hrtimer handling\n\nThomas explained in https://lore.kernel.org/r/87mtoeb4hb.ffs@tglx\nthat our handling of the hrtimer here is wrong: If the timer fires\nlate (e.g. due to vCPU scheduling, as reported by Dmitry/syzbot)\nthen it tries to actually rearm the timer at the next deadline,\nwhich might be in the past already:\n\n 1 2 3 N N+1\n | | | ... | |\n\n ^ intended to fire here (1)\n ^ next deadline here (2)\n ^ actually fired here\n\nThe next time it fires, it's later, but will still try to schedule\nfor the next deadline (now 3), etc. until it catches up with N,\nbut that might take a long time, causing stalls etc.\n\nNow, all of this is simulation, so we just have to fix it, but\nnote that the behaviour is wrong even per spec, since there's no\nvalue then in sending all those beacons unaligned - they should be\naligned to the TBTT (1, 2, 3, ... in the picture), and if we're a\nbit (or a lot) late, then just resume at that point.\n\nTherefore, change the code to use hrtimer_forward_now() which will\nensure that the next firing of the timer would be at N+1 (in the\npicture), i.e. the next interval point after the current time.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47396", url: "https://www.suse.com/security/cve/CVE-2021-47396", }, { category: "external", summary: "SUSE Bug 1225327 for CVE-2021-47396", url: "https://bugzilla.suse.com/1225327", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47396", }, { cve: "CVE-2021-47397", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47397", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb\n\nWe should always check if skb_header_pointer's return is NULL before\nusing it, otherwise it may cause null-ptr-deref, as syzbot reported:\n\n KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\n RIP: 0010:sctp_rcv_ootb net/sctp/input.c:705 [inline]\n RIP: 0010:sctp_rcv+0x1d84/0x3220 net/sctp/input.c:196\n Call Trace:\n <IRQ>\n sctp6_rcv+0x38/0x60 net/sctp/ipv6.c:1109\n ip6_protocol_deliver_rcu+0x2e9/0x1ca0 net/ipv6/ip6_input.c:422\n ip6_input_finish+0x62/0x170 net/ipv6/ip6_input.c:463\n NF_HOOK include/linux/netfilter.h:307 [inline]\n NF_HOOK include/linux/netfilter.h:301 [inline]\n ip6_input+0x9c/0xd0 net/ipv6/ip6_input.c:472\n dst_input include/net/dst.h:460 [inline]\n ip6_rcv_finish net/ipv6/ip6_input.c:76 [inline]\n NF_HOOK include/linux/netfilter.h:307 [inline]\n NF_HOOK include/linux/netfilter.h:301 [inline]\n ipv6_rcv+0x28c/0x3c0 net/ipv6/ip6_input.c:297", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47397", url: "https://www.suse.com/security/cve/CVE-2021-47397", }, { category: "external", summary: "SUSE Bug 1225082 for CVE-2021-47397", url: "https://bugzilla.suse.com/1225082", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47397", }, { cve: "CVE-2021-47398", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47398", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hfi1: Fix kernel pointer leak\n\nPointers should be printed with %p or %px rather than cast to 'unsigned\nlong long' and printed with %llx. Change %llx to %p to print the secured\npointer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47398", url: "https://www.suse.com/security/cve/CVE-2021-47398", }, { category: "external", summary: "SUSE Bug 1225131 for CVE-2021-47398", url: "https://bugzilla.suse.com/1225131", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47398", }, { cve: "CVE-2021-47399", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47399", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup\n\nThe ixgbe driver currently generates a NULL pointer dereference with\nsome machine (online cpus < 63). This is due to the fact that the\nmaximum value of num_xdp_queues is nr_cpu_ids. Code is in\n\"ixgbe_set_rss_queues\"\".\n\nHere's how the problem repeats itself:\nSome machine (online cpus < 63), And user set num_queues to 63 through\nethtool. Code is in the \"ixgbe_set_channels\",\n\tadapter->ring_feature[RING_F_FDIR].limit = count;\n\nIt becomes 63.\n\nWhen user use xdp, \"ixgbe_set_rss_queues\" will set queues num.\n\tadapter->num_rx_queues = rss_i;\n\tadapter->num_tx_queues = rss_i;\n\tadapter->num_xdp_queues = ixgbe_xdp_queues(adapter);\n\nAnd rss_i's value is from\n\tf = &adapter->ring_feature[RING_F_FDIR];\n\trss_i = f->indices = f->limit;\n\nSo \"num_rx_queues\" > \"num_xdp_queues\", when run to \"ixgbe_xdp_setup\",\n\tfor (i = 0; i < adapter->num_rx_queues; i++)\n\t\tif (adapter->xdp_ring[i]->xsk_umem)\n\nIt leads to panic.\n\nCall trace:\n[exception RIP: ixgbe_xdp+368]\nRIP: ffffffffc02a76a0 RSP: ffff9fe16202f8d0 RFLAGS: 00010297\nRAX: 0000000000000000 RBX: 0000000000000020 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: 000000000000001c RDI: ffffffffa94ead90\nRBP: ffff92f8f24c0c18 R8: 0000000000000000 R9: 0000000000000000\nR10: ffff9fe16202f830 R11: 0000000000000000 R12: ffff92f8f24c0000\nR13: ffff9fe16202fc01 R14: 000000000000000a R15: ffffffffc02a7530\nORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018\n 7 [ffff9fe16202f8f0] dev_xdp_install at ffffffffa89fbbcc\n 8 [ffff9fe16202f920] dev_change_xdp_fd at ffffffffa8a08808\n 9 [ffff9fe16202f960] do_setlink at ffffffffa8a20235\n10 [ffff9fe16202fa88] rtnl_setlink at ffffffffa8a20384\n11 [ffff9fe16202fc78] rtnetlink_rcv_msg at ffffffffa8a1a8dd\n12 [ffff9fe16202fcf0] netlink_rcv_skb at ffffffffa8a717eb\n13 [ffff9fe16202fd40] netlink_unicast at ffffffffa8a70f88\n14 [ffff9fe16202fd80] netlink_sendmsg at ffffffffa8a71319\n15 [ffff9fe16202fdf0] sock_sendmsg at ffffffffa89df290\n16 [ffff9fe16202fe08] __sys_sendto at ffffffffa89e19c8\n17 [ffff9fe16202ff30] __x64_sys_sendto at ffffffffa89e1a64\n18 [ffff9fe16202ff38] do_syscall_64 at ffffffffa84042b9\n19 [ffff9fe16202ff50] entry_SYSCALL_64_after_hwframe at ffffffffa8c0008c\n\nSo I fix ixgbe_max_channels so that it will not allow a setting of queues\nto be higher than the num_online_cpus(). And when run to ixgbe_xdp_setup,\ntake the smaller value of num_rx_queues and num_xdp_queues.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47399", url: "https://www.suse.com/security/cve/CVE-2021-47399", }, { category: "external", summary: "SUSE Bug 1225328 for CVE-2021-47399", url: "https://bugzilla.suse.com/1225328", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47399", }, { cve: "CVE-2021-47400", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47400", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: do not allow call hns3_nic_net_open repeatedly\n\nhns3_nic_net_open() is not allowed to called repeatly, but there\nis no checking for this. When doing device reset and setup tc\nconcurrently, there is a small oppotunity to call hns3_nic_net_open\nrepeatedly, and cause kernel bug by calling napi_enable twice.\n\nThe calltrace information is like below:\n[ 3078.222780] ------------[ cut here ]------------\n[ 3078.230255] kernel BUG at net/core/dev.c:6991!\n[ 3078.236224] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP\n[ 3078.243431] Modules linked in: hns3 hclgevf hclge hnae3 vfio_iommu_type1 vfio_pci vfio_virqfd vfio pv680_mii(O)\n[ 3078.258880] CPU: 0 PID: 295 Comm: kworker/u8:5 Tainted: G O 5.14.0-rc4+ #1\n[ 3078.269102] Hardware name: , BIOS KpxxxFPGA 1P B600 V181 08/12/2021\n[ 3078.276801] Workqueue: hclge hclge_service_task [hclge]\n[ 3078.288774] pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--)\n[ 3078.296168] pc : napi_enable+0x80/0x84\ntc qdisc sho[w 3d0e7v8 .e3t0h218 79] lr : hns3_nic_net_open+0x138/0x510 [hns3]\n\n[ 3078.314771] sp : ffff8000108abb20\n[ 3078.319099] x29: ffff8000108abb20 x28: 0000000000000000 x27: ffff0820a8490300\n[ 3078.329121] x26: 0000000000000001 x25: ffff08209cfc6200 x24: 0000000000000000\n[ 3078.339044] x23: ffff0820a8490300 x22: ffff08209cd76000 x21: ffff0820abfe3880\n[ 3078.349018] x20: 0000000000000000 x19: ffff08209cd76900 x18: 0000000000000000\n[ 3078.358620] x17: 0000000000000000 x16: ffffc816e1727a50 x15: 0000ffff8f4ff930\n[ 3078.368895] x14: 0000000000000000 x13: 0000000000000000 x12: 0000259e9dbeb6b4\n[ 3078.377987] x11: 0096a8f7e764eb40 x10: 634615ad28d3eab5 x9 : ffffc816ad8885b8\n[ 3078.387091] x8 : ffff08209cfc6fb8 x7 : ffff0820ac0da058 x6 : ffff0820a8490344\n[ 3078.396356] x5 : 0000000000000140 x4 : 0000000000000003 x3 : ffff08209cd76938\n[ 3078.405365] x2 : 0000000000000000 x1 : 0000000000000010 x0 : ffff0820abfe38a0\n[ 3078.414657] Call trace:\n[ 3078.418517] napi_enable+0x80/0x84\n[ 3078.424626] hns3_reset_notify_up_enet+0x78/0xd0 [hns3]\n[ 3078.433469] hns3_reset_notify+0x64/0x80 [hns3]\n[ 3078.441430] hclge_notify_client+0x68/0xb0 [hclge]\n[ 3078.450511] hclge_reset_rebuild+0x524/0x884 [hclge]\n[ 3078.458879] hclge_reset_service_task+0x3c4/0x680 [hclge]\n[ 3078.467470] hclge_service_task+0xb0/0xb54 [hclge]\n[ 3078.475675] process_one_work+0x1dc/0x48c\n[ 3078.481888] worker_thread+0x15c/0x464\n[ 3078.487104] kthread+0x160/0x170\n[ 3078.492479] ret_from_fork+0x10/0x18\n[ 3078.498785] Code: c8027c81 35ffffa2 d50323bf d65f03c0 (d4210000)\n[ 3078.506889] ---[ end trace 8ebe0340a1b0fb44 ]---\n\nOnce hns3_nic_net_open() is excute success, the flag\nHNS3_NIC_STATE_DOWN will be cleared. So add checking for this\nflag, directly return when HNS3_NIC_STATE_DOWN is no set.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47400", url: "https://www.suse.com/security/cve/CVE-2021-47400", }, { category: "external", summary: "SUSE Bug 1225329 for CVE-2021-47400", url: "https://bugzilla.suse.com/1225329", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47400", }, { cve: "CVE-2021-47401", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47401", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nipack: ipoctal: fix stack information leak\n\nThe tty driver name is used also after registering the driver and must\nspecifically not be allocated on the stack to avoid leaking information\nto user space (or triggering an oops).\n\nDrivers should not try to encode topology information in the tty device\nname but this one snuck in through staging without anyone noticing and\nanother driver has since copied this malpractice.\n\nFixing the ABI is a separate issue, but this at least plugs the security\nhole.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47401", url: "https://www.suse.com/security/cve/CVE-2021-47401", }, { category: "external", summary: "SUSE Bug 1225242 for CVE-2021-47401", url: "https://bugzilla.suse.com/1225242", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47401", }, { cve: "CVE-2021-47402", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47402", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: flower: protect fl_walk() with rcu\n\nPatch that refactored fl_walk() to use idr_for_each_entry_continue_ul()\nalso removed rcu protection of individual filters which causes following\nuse-after-free when filter is deleted concurrently. Fix fl_walk() to obtain\nrcu read lock while iterating and taking the filter reference and temporary\nrelease the lock while calling arg->fn() callback that can sleep.\n\nKASAN trace:\n\n[ 352.773640] ==================================================================\n[ 352.775041] BUG: KASAN: use-after-free in fl_walk+0x159/0x240 [cls_flower]\n[ 352.776304] Read of size 4 at addr ffff8881c8251480 by task tc/2987\n\n[ 352.777862] CPU: 3 PID: 2987 Comm: tc Not tainted 5.15.0-rc2+ #2\n[ 352.778980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n[ 352.781022] Call Trace:\n[ 352.781573] dump_stack_lvl+0x46/0x5a\n[ 352.782332] print_address_description.constprop.0+0x1f/0x140\n[ 352.783400] ? fl_walk+0x159/0x240 [cls_flower]\n[ 352.784292] ? fl_walk+0x159/0x240 [cls_flower]\n[ 352.785138] kasan_report.cold+0x83/0xdf\n[ 352.785851] ? fl_walk+0x159/0x240 [cls_flower]\n[ 352.786587] kasan_check_range+0x145/0x1a0\n[ 352.787337] fl_walk+0x159/0x240 [cls_flower]\n[ 352.788163] ? fl_put+0x10/0x10 [cls_flower]\n[ 352.789007] ? __mutex_unlock_slowpath.constprop.0+0x220/0x220\n[ 352.790102] tcf_chain_dump+0x231/0x450\n[ 352.790878] ? tcf_chain_tp_delete_empty+0x170/0x170\n[ 352.791833] ? __might_sleep+0x2e/0xc0\n[ 352.792594] ? tfilter_notify+0x170/0x170\n[ 352.793400] ? __mutex_unlock_slowpath.constprop.0+0x220/0x220\n[ 352.794477] tc_dump_tfilter+0x385/0x4b0\n[ 352.795262] ? tc_new_tfilter+0x1180/0x1180\n[ 352.796103] ? __mod_node_page_state+0x1f/0xc0\n[ 352.796974] ? __build_skb_around+0x10e/0x130\n[ 352.797826] netlink_dump+0x2c0/0x560\n[ 352.798563] ? netlink_getsockopt+0x430/0x430\n[ 352.799433] ? __mutex_unlock_slowpath.constprop.0+0x220/0x220\n[ 352.800542] __netlink_dump_start+0x356/0x440\n[ 352.801397] rtnetlink_rcv_msg+0x3ff/0x550\n[ 352.802190] ? tc_new_tfilter+0x1180/0x1180\n[ 352.802872] ? rtnl_calcit.isra.0+0x1f0/0x1f0\n[ 352.803668] ? tc_new_tfilter+0x1180/0x1180\n[ 352.804344] ? _copy_from_iter_nocache+0x800/0x800\n[ 352.805202] ? kasan_set_track+0x1c/0x30\n[ 352.805900] netlink_rcv_skb+0xc6/0x1f0\n[ 352.806587] ? rht_deferred_worker+0x6b0/0x6b0\n[ 352.807455] ? rtnl_calcit.isra.0+0x1f0/0x1f0\n[ 352.808324] ? netlink_ack+0x4d0/0x4d0\n[ 352.809086] ? netlink_deliver_tap+0x62/0x3d0\n[ 352.809951] netlink_unicast+0x353/0x480\n[ 352.810744] ? netlink_attachskb+0x430/0x430\n[ 352.811586] ? __alloc_skb+0xd7/0x200\n[ 352.812349] netlink_sendmsg+0x396/0x680\n[ 352.813132] ? netlink_unicast+0x480/0x480\n[ 352.813952] ? __import_iovec+0x192/0x210\n[ 352.814759] ? netlink_unicast+0x480/0x480\n[ 352.815580] sock_sendmsg+0x6c/0x80\n[ 352.816299] ____sys_sendmsg+0x3a5/0x3c0\n[ 352.817096] ? kernel_sendmsg+0x30/0x30\n[ 352.817873] ? __ia32_sys_recvmmsg+0x150/0x150\n[ 352.818753] ___sys_sendmsg+0xd8/0x140\n[ 352.819518] ? sendmsg_copy_msghdr+0x110/0x110\n[ 352.820402] ? ___sys_recvmsg+0xf4/0x1a0\n[ 352.821110] ? __copy_msghdr_from_user+0x260/0x260\n[ 352.821934] ? _raw_spin_lock+0x81/0xd0\n[ 352.822680] ? __handle_mm_fault+0xef3/0x1b20\n[ 352.823549] ? rb_insert_color+0x2a/0x270\n[ 352.824373] ? copy_page_range+0x16b0/0x16b0\n[ 352.825209] ? perf_event_update_userpage+0x2d0/0x2d0\n[ 352.826190] ? __fget_light+0xd9/0xf0\n[ 352.826941] __sys_sendmsg+0xb3/0x130\n[ 352.827613] ? __sys_sendmsg_sock+0x20/0x20\n[ 352.828377] ? do_user_addr_fault+0x2c5/0x8a0\n[ 352.829184] ? fpregs_assert_state_consistent+0x52/0x60\n[ 352.830001] ? exit_to_user_mode_prepare+0x32/0x160\n[ 352.830845] do_syscall_64+0x35/0x80\n[ 352.831445] entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 352.832331] RIP: 0033:0x7f7bee973c17\n[ \n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47402", url: "https://www.suse.com/security/cve/CVE-2021-47402", }, { category: "external", summary: "SUSE Bug 1225301 for CVE-2021-47402", url: "https://bugzilla.suse.com/1225301", }, { category: "external", summary: "SUSE Bug 1225302 for CVE-2021-47402", url: "https://bugzilla.suse.com/1225302", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47402", }, { cve: "CVE-2021-47403", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47403", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nipack: ipoctal: fix module reference leak\n\nA reference to the carrier module was taken on every open but was only\nreleased once when the final reference to the tty struct was dropped.\n\nFix this by taking the module reference and initialising the tty driver\ndata when installing the tty.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47403", url: "https://www.suse.com/security/cve/CVE-2021-47403", }, { category: "external", summary: "SUSE Bug 1225241 for CVE-2021-47403", url: "https://bugzilla.suse.com/1225241", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47403", }, { cve: "CVE-2021-47404", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47404", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: betop: fix slab-out-of-bounds Write in betop_probe\n\nSyzbot reported slab-out-of-bounds Write bug in hid-betopff driver.\nThe problem is the driver assumes the device must have an input report but\nsome malicious devices violate this assumption.\n\nSo this patch checks hid_device's input is non empty before it's been used.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47404", url: "https://www.suse.com/security/cve/CVE-2021-47404", }, { category: "external", summary: "SUSE Bug 1225303 for CVE-2021-47404", url: "https://bugzilla.suse.com/1225303", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47404", }, { cve: "CVE-2021-47405", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47405", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: usbhid: free raw_report buffers in usbhid_stop\n\nFree the unsent raw_report buffers when the device is removed.\n\nFixes a memory leak reported by syzbot at:\nhttps://syzkaller.appspot.com/bug?id=7b4fa7cb1a7c2d3342a2a8a6c53371c8c418ab47", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47405", url: "https://www.suse.com/security/cve/CVE-2021-47405", }, { category: "external", summary: "SUSE Bug 1225238 for CVE-2021-47405", url: "https://bugzilla.suse.com/1225238", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47405", }, { cve: "CVE-2021-47406", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47406", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\next4: add error checking to ext4_ext_replay_set_iblocks()\n\nIf the call to ext4_map_blocks() fails due to an corrupted file\nsystem, ext4_ext_replay_set_iblocks() can get stuck in an infinite\nloop. This could be reproduced by running generic/526 with a file\nsystem that has inline_data and fast_commit enabled. The system will\nrepeatedly log to the console:\n\nEXT4-fs warning (device dm-3): ext4_block_to_path:105: block 1074800922 > max in inode 131076\n\nand the stack that it gets stuck in is:\n\n ext4_block_to_path+0xe3/0x130\n ext4_ind_map_blocks+0x93/0x690\n ext4_map_blocks+0x100/0x660\n skip_hole+0x47/0x70\n ext4_ext_replay_set_iblocks+0x223/0x440\n ext4_fc_replay_inode+0x29e/0x3b0\n ext4_fc_replay+0x278/0x550\n do_one_pass+0x646/0xc10\n jbd2_journal_recover+0x14a/0x270\n jbd2_journal_load+0xc4/0x150\n ext4_load_journal+0x1f3/0x490\n ext4_fill_super+0x22d4/0x2c00\n\nWith this patch, generic/526 still fails, but system is no longer\nlocking up in a tight loop. It's likely the root casue is that\nfast_commit replay is corrupting file systems with inline_data, and we\nprobably need to add better error handling in the fast commit replay\ncode path beyond what is done here, which essentially just breaks the\ninfinite loop without reporting the to the higher levels of the code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47406", url: "https://www.suse.com/security/cve/CVE-2021-47406", }, { category: "external", summary: "SUSE Bug 1225304 for CVE-2021-47406", url: "https://bugzilla.suse.com/1225304", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47406", }, { cve: "CVE-2021-47407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47407", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Handle SRCU initialization failure during page track init\n\nCheck the return of init_srcu_struct(), which can fail due to OOM, when\ninitializing the page track mechanism. Lack of checking leads to a NULL\npointer deref found by a modified syzkaller.\n\n[Move the call towards the beginning of kvm_arch_init_vm. - Paolo]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47407", url: "https://www.suse.com/security/cve/CVE-2021-47407", }, { category: "external", summary: "SUSE Bug 1225306 for CVE-2021-47407", url: "https://bugzilla.suse.com/1225306", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47407", }, { cve: "CVE-2021-47408", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47408", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: conntrack: serialize hash resizes and cleanups\n\nSyzbot was able to trigger the following warning [1]\n\nNo repro found by syzbot yet but I was able to trigger similar issue\nby having 2 scripts running in parallel, changing conntrack hash sizes,\nand:\n\nfor j in `seq 1 1000` ; do unshare -n /bin/true >/dev/null ; done\n\nIt would take more than 5 minutes for net_namespace structures\nto be cleaned up.\n\nThis is because nf_ct_iterate_cleanup() has to restart everytime\na resize happened.\n\nBy adding a mutex, we can serialize hash resizes and cleanups\nand also make get_next_corpse() faster by skipping over empty\nbuckets.\n\nEven without resizes in the picture, this patch considerably\nspeeds up network namespace dismantles.\n\n[1]\nINFO: task syz-executor.0:8312 can't die for more than 144 seconds.\ntask:syz-executor.0 state:R running task stack:25672 pid: 8312 ppid: 6573 flags:0x00004006\nCall Trace:\n context_switch kernel/sched/core.c:4955 [inline]\n __schedule+0x940/0x26f0 kernel/sched/core.c:6236\n preempt_schedule_common+0x45/0xc0 kernel/sched/core.c:6408\n preempt_schedule_thunk+0x16/0x18 arch/x86/entry/thunk_64.S:35\n __local_bh_enable_ip+0x109/0x120 kernel/softirq.c:390\n local_bh_enable include/linux/bottom_half.h:32 [inline]\n get_next_corpse net/netfilter/nf_conntrack_core.c:2252 [inline]\n nf_ct_iterate_cleanup+0x15a/0x450 net/netfilter/nf_conntrack_core.c:2275\n nf_conntrack_cleanup_net_list+0x14c/0x4f0 net/netfilter/nf_conntrack_core.c:2469\n ops_exit_list+0x10d/0x160 net/core/net_namespace.c:171\n setup_net+0x639/0xa30 net/core/net_namespace.c:349\n copy_net_ns+0x319/0x760 net/core/net_namespace.c:470\n create_new_namespaces+0x3f6/0xb20 kernel/nsproxy.c:110\n unshare_nsproxy_namespaces+0xc1/0x1f0 kernel/nsproxy.c:226\n ksys_unshare+0x445/0x920 kernel/fork.c:3128\n __do_sys_unshare kernel/fork.c:3202 [inline]\n __se_sys_unshare kernel/fork.c:3200 [inline]\n __x64_sys_unshare+0x2d/0x40 kernel/fork.c:3200\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f63da68e739\nRSP: 002b:00007f63d7c05188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110\nRAX: ffffffffffffffda RBX: 00007f63da792f80 RCX: 00007f63da68e739\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000\nRBP: 00007f63da6e8cc4 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007f63da792f80\nR13: 00007fff50b75d3f R14: 00007f63d7c05300 R15: 0000000000022000\n\nShowing all locks held in the system:\n1 lock held by khungtaskd/27:\n #0: ffffffff8b980020 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6446\n2 locks held by kworker/u4:2/153:\n #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline]\n #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: arch_atomic_long_set include/linux/atomic/atomic-long.h:41 [inline]\n #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: atomic_long_set include/linux/atomic/atomic-instrumented.h:1198 [inline]\n #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: set_work_data kernel/workqueue.c:634 [inline]\n #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: set_work_pool_and_clear_pending kernel/workqueue.c:661 [inline]\n #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x896/0x1690 kernel/workqueue.c:2268\n #1: ffffc9000140fdb0 ((kfence_timer).work){+.+.}-{0:0}, at: process_one_work+0x8ca/0x1690 kernel/workqueue.c:2272\n1 lock held by systemd-udevd/2970:\n1 lock held by in:imklog/6258:\n #0: ffff88807f970ff0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:990\n3 locks held by kworker/1:6/8158:\n1 lock held by syz-executor.0/8312:\n2 locks held by kworker/u4:13/9320:\n1 lock held by\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47408", url: "https://www.suse.com/security/cve/CVE-2021-47408", }, { category: "external", summary: "SUSE Bug 1225236 for CVE-2021-47408", url: "https://bugzilla.suse.com/1225236", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47408", }, { cve: "CVE-2021-47409", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47409", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc2: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47409", url: "https://www.suse.com/security/cve/CVE-2021-47409", }, { category: "external", summary: "SUSE Bug 1225330 for CVE-2021-47409", url: "https://bugzilla.suse.com/1225330", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47409", }, { cve: "CVE-2021-47410", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47410", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: fix svm_migrate_fini warning\n\nDevice manager releases device-specific resources when a driver\ndisconnects from a device, devm_memunmap_pages and\ndevm_release_mem_region calls in svm_migrate_fini are redundant.\n\nIt causes below warning trace after patch \"drm/amdgpu: Split\namdgpu_device_fini into early and late\", so remove function\nsvm_migrate_fini.\n\nBUG: https://gitlab.freedesktop.org/drm/amd/-/issues/1718\n\nWARNING: CPU: 1 PID: 3646 at drivers/base/devres.c:795\ndevm_release_action+0x51/0x60\nCall Trace:\n ? memunmap_pages+0x360/0x360\n svm_migrate_fini+0x2d/0x60 [amdgpu]\n kgd2kfd_device_exit+0x23/0xa0 [amdgpu]\n amdgpu_amdkfd_device_fini_sw+0x1d/0x30 [amdgpu]\n amdgpu_device_fini_sw+0x45/0x290 [amdgpu]\n amdgpu_driver_release_kms+0x12/0x30 [amdgpu]\n drm_dev_release+0x20/0x40 [drm]\n release_nodes+0x196/0x1e0\n device_release_driver_internal+0x104/0x1d0\n driver_detach+0x47/0x90\n bus_remove_driver+0x7a/0xd0\n pci_unregister_driver+0x3d/0x90\n amdgpu_exit+0x11/0x20 [amdgpu]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47410", url: "https://www.suse.com/security/cve/CVE-2021-47410", }, { category: "external", summary: "SUSE Bug 1225331 for CVE-2021-47410", url: "https://bugzilla.suse.com/1225331", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47410", }, { cve: "CVE-2021-47412", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47412", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: don't call rq_qos_ops->done_bio if the bio isn't tracked\n\nrq_qos framework is only applied on request based driver, so:\n\n1) rq_qos_done_bio() needn't to be called for bio based driver\n\n2) rq_qos_done_bio() needn't to be called for bio which isn't tracked,\nsuch as bios ended from error handling code.\n\nEspecially in bio_endio():\n\n1) request queue is referred via bio->bi_bdev->bd_disk->queue, which\nmay be gone since request queue refcount may not be held in above two\ncases\n\n2) q->rq_qos may be freed in blk_cleanup_queue() when calling into\n__rq_qos_done_bio()\n\nFix the potential kernel panic by not calling rq_qos_ops->done_bio if\nthe bio isn't tracked. This way is safe because both ioc_rqos_done_bio()\nand blkcg_iolatency_done_bio() are nop if the bio isn't tracked.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47412", url: "https://www.suse.com/security/cve/CVE-2021-47412", }, { category: "external", summary: "SUSE Bug 1225332 for CVE-2021-47412", url: "https://bugzilla.suse.com/1225332", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47412", }, { cve: "CVE-2021-47413", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47413", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle\n\nWhen passing 'phys' in the devicetree to describe the USB PHY phandle\n(which is the recommended way according to\nDocumentation/devicetree/bindings/usb/ci-hdrc-usb2.txt) the\nfollowing NULL pointer dereference is observed on i.MX7 and i.MX8MM:\n\n[ 1.489344] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000098\n[ 1.498170] Mem abort info:\n[ 1.500966] ESR = 0x96000044\n[ 1.504030] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 1.509356] SET = 0, FnV = 0\n[ 1.512416] EA = 0, S1PTW = 0\n[ 1.515569] FSC = 0x04: level 0 translation fault\n[ 1.520458] Data abort info:\n[ 1.523349] ISV = 0, ISS = 0x00000044\n[ 1.527196] CM = 0, WnR = 1\n[ 1.530176] [0000000000000098] user address but active_mm is swapper\n[ 1.536544] Internal error: Oops: 96000044 [#1] PREEMPT SMP\n[ 1.542125] Modules linked in:\n[ 1.545190] CPU: 3 PID: 7 Comm: kworker/u8:0 Not tainted 5.14.0-dirty #3\n[ 1.551901] Hardware name: Kontron i.MX8MM N801X S (DT)\n[ 1.557133] Workqueue: events_unbound deferred_probe_work_func\n[ 1.562984] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO BTYPE=--)\n[ 1.568998] pc : imx7d_charger_detection+0x3f0/0x510\n[ 1.573973] lr : imx7d_charger_detection+0x22c/0x510\n\nThis happens because the charger functions check for the phy presence\ninside the imx_usbmisc_data structure (data->usb_phy), but the chipidea\ncore populates the usb_phy passed via 'phys' inside 'struct ci_hdrc'\n(ci->usb_phy) instead.\n\nThis causes the NULL pointer dereference inside imx7d_charger_detection().\n\nFix it by also searching for 'phys' in case 'fsl,usbphy' is not found.\n\nTested on a imx7s-warp board.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47413", url: "https://www.suse.com/security/cve/CVE-2021-47413", }, { category: "external", summary: "SUSE Bug 1225333 for CVE-2021-47413", url: "https://bugzilla.suse.com/1225333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47413", }, { cve: "CVE-2021-47414", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47414", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv: Flush current cpu icache before other cpus\n\nOn SiFive Unmatched, I recently fell onto the following BUG when booting:\n\n[ 0.000000] ftrace: allocating 36610 entries in 144 pages\n[ 0.000000] Oops - illegal instruction [#1]\n[ 0.000000] Modules linked in:\n[ 0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 5.13.1+ #5\n[ 0.000000] Hardware name: SiFive HiFive Unmatched A00 (DT)\n[ 0.000000] epc : riscv_cpuid_to_hartid_mask+0x6/0xae\n[ 0.000000] ra : __sbi_rfence_v02+0xc8/0x10a\n[ 0.000000] epc : ffffffff80007240 ra : ffffffff80009964 sp : ffffffff81803e10\n[ 0.000000] gp : ffffffff81a1ea70 tp : ffffffff8180f500 t0 : ffffffe07fe30000\n[ 0.000000] t1 : 0000000000000004 t2 : 0000000000000000 s0 : ffffffff81803e60\n[ 0.000000] s1 : 0000000000000000 a0 : ffffffff81a22238 a1 : ffffffff81803e10\n[ 0.000000] a2 : 0000000000000000 a3 : 0000000000000000 a4 : 0000000000000000\n[ 0.000000] a5 : 0000000000000000 a6 : ffffffff8000989c a7 : 0000000052464e43\n[ 0.000000] s2 : ffffffff81a220c8 s3 : 0000000000000000 s4 : 0000000000000000\n[ 0.000000] s5 : 0000000000000000 s6 : 0000000200000100 s7 : 0000000000000001\n[ 0.000000] s8 : ffffffe07fe04040 s9 : ffffffff81a22c80 s10: 0000000000001000\n[ 0.000000] s11: 0000000000000004 t3 : 0000000000000001 t4 : 0000000000000008\n[ 0.000000] t5 : ffffffcf04000808 t6 : ffffffe3ffddf188\n[ 0.000000] status: 0000000200000100 badaddr: 0000000000000000 cause: 0000000000000002\n[ 0.000000] [<ffffffff80007240>] riscv_cpuid_to_hartid_mask+0x6/0xae\n[ 0.000000] [<ffffffff80009474>] sbi_remote_fence_i+0x1e/0x26\n[ 0.000000] [<ffffffff8000b8f4>] flush_icache_all+0x12/0x1a\n[ 0.000000] [<ffffffff8000666c>] patch_text_nosync+0x26/0x32\n[ 0.000000] [<ffffffff8000884e>] ftrace_init_nop+0x52/0x8c\n[ 0.000000] [<ffffffff800f051e>] ftrace_process_locs.isra.0+0x29c/0x360\n[ 0.000000] [<ffffffff80a0e3c6>] ftrace_init+0x80/0x130\n[ 0.000000] [<ffffffff80a00f8c>] start_kernel+0x5c4/0x8f6\n[ 0.000000] ---[ end trace f67eb9af4d8d492b ]---\n[ 0.000000] Kernel panic - not syncing: Attempted to kill the idle task!\n[ 0.000000] ---[ end Kernel panic - not syncing: Attempted to kill the idle task! ]---\n\nWhile ftrace is looping over a list of addresses to patch, it always failed\nwhen patching the same function: riscv_cpuid_to_hartid_mask. Looking at the\nbacktrace, the illegal instruction is encountered in this same function.\nHowever, patch_text_nosync, after patching the instructions, calls\nflush_icache_range. But looking at what happens in this function:\n\nflush_icache_range -> flush_icache_all\n -> sbi_remote_fence_i\n -> __sbi_rfence_v02\n -> riscv_cpuid_to_hartid_mask\n\nThe icache and dcache of the current cpu are never synchronized between the\npatching of riscv_cpuid_to_hartid_mask and calling this same function.\n\nSo fix this by flushing the current cpu's icache before asking for the other\ncpus to do the same.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47414", url: "https://www.suse.com/security/cve/CVE-2021-47414", }, { category: "external", summary: "SUSE Bug 1225334 for CVE-2021-47414", url: "https://bugzilla.suse.com/1225334", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47414", }, { cve: "CVE-2021-47415", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47415", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\niwlwifi: mvm: Fix possible NULL dereference\n\nIn __iwl_mvm_remove_time_event() check that 'te_data->vif' is NULL\nbefore dereferencing it.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47415", url: "https://www.suse.com/security/cve/CVE-2021-47415", }, { category: "external", summary: "SUSE Bug 1225335 for CVE-2021-47415", url: "https://bugzilla.suse.com/1225335", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47415", }, { cve: "CVE-2021-47416", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47416", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: mdio: fix memory leak\n\nSyzbot reported memory leak in MDIO bus interface, the problem was in\nwrong state logic.\n\nMDIOBUS_ALLOCATED indicates 2 states:\n\t1. Bus is only allocated\n\t2. Bus allocated and __mdiobus_register() fails, but\n\t device_register() was called\n\nIn case of device_register() has been called we should call put_device()\nto correctly free the memory allocated for this device, but mdiobus_free()\ncalls just kfree(dev) in case of MDIOBUS_ALLOCATED state\n\nTo avoid this behaviour we need to set bus->state to MDIOBUS_UNREGISTERED\n_before_ calling device_register(), because put_device() should be\ncalled even in case of device_register() failure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47416", url: "https://www.suse.com/security/cve/CVE-2021-47416", }, { category: "external", summary: "SUSE Bug 1225189 for CVE-2021-47416", url: "https://bugzilla.suse.com/1225189", }, { category: "external", summary: "SUSE Bug 1225336 for CVE-2021-47416", url: "https://bugzilla.suse.com/1225336", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47416", }, { cve: "CVE-2021-47417", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47417", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nlibbpf: Fix memory leak in strset\n\nFree struct strset itself, not just its internal parts.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47417", url: "https://www.suse.com/security/cve/CVE-2021-47417", }, { category: "external", summary: "SUSE Bug 1225227 for CVE-2021-47417", url: "https://bugzilla.suse.com/1225227", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47417", }, { cve: "CVE-2021-47418", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47418", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: fix NULL deref in fifo_set_limit()\n\nsyzbot reported another NULL deref in fifo_set_limit() [1]\n\nI could repro the issue with :\n\nunshare -n\ntc qd add dev lo root handle 1:0 tbf limit 200000 burst 70000 rate 100Mbit\ntc qd replace dev lo parent 1:0 pfifo_fast\ntc qd change dev lo root handle 1:0 tbf limit 300000 burst 70000 rate 100Mbit\n\npfifo_fast does not have a change() operation.\nMake fifo_set_limit() more robust about this.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nPGD 1cf99067 P4D 1cf99067 PUD 7ca49067 PMD 0\nOops: 0010 [#1] PREEMPT SMP KASAN\nCPU: 1 PID: 14443 Comm: syz-executor959 Not tainted 5.15.0-rc3-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:0x0\nCode: Unable to access opcode bytes at RIP 0xffffffffffffffd6.\nRSP: 0018:ffffc9000e2f7310 EFLAGS: 00010246\nRAX: dffffc0000000000 RBX: ffffffff8d6ecc00 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: ffff888024c27910 RDI: ffff888071e34000\nRBP: ffff888071e34000 R08: 0000000000000001 R09: ffffffff8fcfb947\nR10: 0000000000000001 R11: 0000000000000000 R12: ffff888024c27910\nR13: ffff888071e34018 R14: 0000000000000000 R15: ffff88801ef74800\nFS: 00007f321d897700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffffffffffffd6 CR3: 00000000722c3000 CR4: 00000000003506e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n fifo_set_limit net/sched/sch_fifo.c:242 [inline]\n fifo_set_limit+0x198/0x210 net/sched/sch_fifo.c:227\n tbf_change+0x6ec/0x16d0 net/sched/sch_tbf.c:418\n qdisc_change net/sched/sch_api.c:1332 [inline]\n tc_modify_qdisc+0xd9a/0x1a60 net/sched/sch_api.c:1634\n rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5572\n netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2504\n netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]\n netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1340\n netlink_sendmsg+0x86d/0xdb0 net/netlink/af_netlink.c:1929\n sock_sendmsg_nosec net/socket.c:704 [inline]\n sock_sendmsg+0xcf/0x120 net/socket.c:724\n ____sys_sendmsg+0x6e8/0x810 net/socket.c:2409\n ___sys_sendmsg+0xf3/0x170 net/socket.c:2463\n __sys_sendmsg+0xe5/0x1b0 net/socket.c:2492\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47418", url: "https://www.suse.com/security/cve/CVE-2021-47418", }, { category: "external", summary: "SUSE Bug 1225337 for CVE-2021-47418", url: "https://bugzilla.suse.com/1225337", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47418", }, { cve: "CVE-2021-47419", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47419", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_taprio: properly cancel timer from taprio_destroy()\n\nThere is a comment in qdisc_create() about us not calling ops->reset()\nin some cases.\n\nerr_out4:\n\t/*\n\t * Any broken qdiscs that would require a ops->reset() here?\n\t * The qdisc was never in action so it shouldn't be necessary.\n\t */\n\nAs taprio sets a timer before actually receiving a packet, we need\nto cancel it from ops->destroy, just in case ops->reset has not\nbeen called.\n\nsyzbot reported:\n\nODEBUG: free active (active state 0) object type: hrtimer hint: advance_sched+0x0/0x9a0 arch/x86/include/asm/atomic64_64.h:22\nWARNING: CPU: 0 PID: 8441 at lib/debugobjects.c:505 debug_print_object+0x16e/0x250 lib/debugobjects.c:505\nModules linked in:\nCPU: 0 PID: 8441 Comm: syz-executor813 Not tainted 5.14.0-rc6-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:debug_print_object+0x16e/0x250 lib/debugobjects.c:505\nCode: ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 af 00 00 00 48 8b 14 dd e0 d3 e3 89 4c 89 ee 48 c7 c7 e0 c7 e3 89 e8 5b 86 11 05 <0f> 0b 83 05 85 03 92 09 01 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e c3\nRSP: 0018:ffffc9000130f330 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000\nRDX: ffff88802baeb880 RSI: ffffffff815d87b5 RDI: fffff52000261e58\nRBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000\nR10: ffffffff815d25ee R11: 0000000000000000 R12: ffffffff898dd020\nR13: ffffffff89e3ce20 R14: ffffffff81653630 R15: dffffc0000000000\nFS: 0000000000f0d300(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffb64b3e000 CR3: 0000000036557000 CR4: 00000000001506e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n __debug_check_no_obj_freed lib/debugobjects.c:987 [inline]\n debug_check_no_obj_freed+0x301/0x420 lib/debugobjects.c:1018\n slab_free_hook mm/slub.c:1603 [inline]\n slab_free_freelist_hook+0x171/0x240 mm/slub.c:1653\n slab_free mm/slub.c:3213 [inline]\n kfree+0xe4/0x540 mm/slub.c:4267\n qdisc_create+0xbcf/0x1320 net/sched/sch_api.c:1299\n tc_modify_qdisc+0x4c8/0x1a60 net/sched/sch_api.c:1663\n rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5571\n netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2504\n netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]\n netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1340\n netlink_sendmsg+0x86d/0xdb0 net/netlink/af_netlink.c:1929\n sock_sendmsg_nosec net/socket.c:704 [inline]\n sock_sendmsg+0xcf/0x120 net/socket.c:724\n ____sys_sendmsg+0x6e8/0x810 net/socket.c:2403\n ___sys_sendmsg+0xf3/0x170 net/socket.c:2457\n __sys_sendmsg+0xe5/0x1b0 net/socket.c:2486\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47419", url: "https://www.suse.com/security/cve/CVE-2021-47419", }, { category: "external", summary: "SUSE Bug 1225338 for CVE-2021-47419", url: "https://bugzilla.suse.com/1225338", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47419", }, { cve: "CVE-2021-47420", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47420", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: fix a potential ttm->sg memory leak\n\nMemory is allocated for ttm->sg by kmalloc in kfd_mem_dmamap_userptr,\nbut isn't freed by kfree in kfd_mem_dmaunmap_userptr. Free it!", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47420", url: "https://www.suse.com/security/cve/CVE-2021-47420", }, { category: "external", summary: "SUSE Bug 1225339 for CVE-2021-47420", url: "https://bugzilla.suse.com/1225339", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47420", }, { cve: "CVE-2021-47421", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47421", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: handle the case of pci_channel_io_frozen only in amdgpu_pci_resume\n\nIn current code, when a PCI error state pci_channel_io_normal is detectd,\nit will report PCI_ERS_RESULT_CAN_RECOVER status to PCI driver, and PCI\ndriver will continue the execution of PCI resume callback report_resume by\npci_walk_bridge, and the callback will go into amdgpu_pci_resume\nfinally, where write lock is releasd unconditionally without acquiring\nsuch lock first. In this case, a deadlock will happen when other threads\nstart to acquire the read lock.\n\nTo fix this, add a member in amdgpu_device strucutre to cache\npci_channel_state, and only continue the execution in amdgpu_pci_resume\nwhen it's pci_channel_io_frozen.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47421", url: "https://www.suse.com/security/cve/CVE-2021-47421", }, { category: "external", summary: "SUSE Bug 1225353 for CVE-2021-47421", url: "https://bugzilla.suse.com/1225353", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47421", }, { cve: "CVE-2021-47422", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47422", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau/kms/nv50-: fix file release memory leak\n\nWhen using single_open() for opening, single_release() should be\ncalled, otherwise the 'op' allocated in single_open() will be leaked.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47422", url: "https://www.suse.com/security/cve/CVE-2021-47422", }, { category: "external", summary: "SUSE Bug 1225233 for CVE-2021-47422", url: "https://bugzilla.suse.com/1225233", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47422", }, { cve: "CVE-2021-47423", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47423", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau/debugfs: fix file release memory leak\n\nWhen using single_open() for opening, single_release() should be\ncalled, otherwise the 'op' allocated in single_open() will be leaked.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47423", url: "https://www.suse.com/security/cve/CVE-2021-47423", }, { category: "external", summary: "SUSE Bug 1225366 for CVE-2021-47423", url: "https://bugzilla.suse.com/1225366", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47423", }, { cve: "CVE-2021-47424", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47424", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix freeing of uninitialized misc IRQ vector\n\nWhen VSI set up failed in i40e_probe() as part of PF switch set up\ndriver was trying to free misc IRQ vectors in\ni40e_clear_interrupt_scheme and produced a kernel Oops:\n\n Trying to free already-free IRQ 266\n WARNING: CPU: 0 PID: 5 at kernel/irq/manage.c:1731 __free_irq+0x9a/0x300\n Workqueue: events work_for_cpu_fn\n RIP: 0010:__free_irq+0x9a/0x300\n Call Trace:\n ? synchronize_irq+0x3a/0xa0\n free_irq+0x2e/0x60\n i40e_clear_interrupt_scheme+0x53/0x190 [i40e]\n i40e_probe.part.108+0x134b/0x1a40 [i40e]\n ? kmem_cache_alloc+0x158/0x1c0\n ? acpi_ut_update_ref_count.part.1+0x8e/0x345\n ? acpi_ut_update_object_reference+0x15e/0x1e2\n ? strstr+0x21/0x70\n ? irq_get_irq_data+0xa/0x20\n ? mp_check_pin_attr+0x13/0xc0\n ? irq_get_irq_data+0xa/0x20\n ? mp_map_pin_to_irq+0xd3/0x2f0\n ? acpi_register_gsi_ioapic+0x93/0x170\n ? pci_conf1_read+0xa4/0x100\n ? pci_bus_read_config_word+0x49/0x70\n ? do_pci_enable_device+0xcc/0x100\n local_pci_probe+0x41/0x90\n work_for_cpu_fn+0x16/0x20\n process_one_work+0x1a7/0x360\n worker_thread+0x1cf/0x390\n ? create_worker+0x1a0/0x1a0\n kthread+0x112/0x130\n ? kthread_flush_work_fn+0x10/0x10\n ret_from_fork+0x1f/0x40\n\nThe problem is that at that point misc IRQ vectors\nwere not allocated yet and we get a call trace\nthat driver is trying to free already free IRQ vectors.\n\nAdd a check in i40e_clear_interrupt_scheme for __I40E_MISC_IRQ_REQUESTED\nPF state before calling i40e_free_misc_vector. This state is set only if\nmisc IRQ vectors were properly initialized.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47424", url: "https://www.suse.com/security/cve/CVE-2021-47424", }, { category: "external", summary: "SUSE Bug 1225367 for CVE-2021-47424", url: "https://bugzilla.suse.com/1225367", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47424", }, { cve: "CVE-2021-47425", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47425", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: acpi: fix resource leak in reconfiguration device addition\n\nacpi_i2c_find_adapter_by_handle() calls bus_find_device() which takes a\nreference on the adapter which is never released which will result in a\nreference count leak and render the adapter unremovable. Make sure to\nput the adapter after creating the client in the same manner that we do\nfor OF.\n\n[wsa: fixed title]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47425", url: "https://www.suse.com/security/cve/CVE-2021-47425", }, { category: "external", summary: "SUSE Bug 1225223 for CVE-2021-47425", url: "https://bugzilla.suse.com/1225223", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47425", }, { cve: "CVE-2021-47426", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47426", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, s390: Fix potential memory leak about jit_data\n\nMake sure to free jit_data through kfree() in the error path.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47426", url: "https://www.suse.com/security/cve/CVE-2021-47426", }, { category: "external", summary: "SUSE Bug 1225370 for CVE-2021-47426", url: "https://bugzilla.suse.com/1225370", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47426", }, { cve: "CVE-2021-47427", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47427", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: iscsi: Fix iscsi_task use after free\n\nCommit d39df158518c (\"scsi: iscsi: Have abort handler get ref to conn\")\nadded iscsi_get_conn()/iscsi_put_conn() calls during abort handling but\nthen also changed the handling of the case where we detect an already\ncompleted task where we now end up doing a goto to the common put/cleanup\ncode. This results in a iscsi_task use after free, because the common\ncleanup code will do a put on the iscsi_task.\n\nThis reverts the goto and moves the iscsi_get_conn() to after we've checked\nif the iscsi_task is valid.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47427", url: "https://www.suse.com/security/cve/CVE-2021-47427", }, { category: "external", summary: "SUSE Bug 1225225 for CVE-2021-47427", url: "https://bugzilla.suse.com/1225225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47427", }, { cve: "CVE-2021-47428", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47428", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/64s: fix program check interrupt emergency stack path\n\nEmergency stack path was jumping into a 3: label inside the\n__GEN_COMMON_BODY macro for the normal path after it had finished,\nrather than jumping over it. By a small miracle this is the correct\nplace to build up a new interrupt frame with the existing stack\npointer, so things basically worked okay with an added weird looking\n700 trap frame on top (which had the wrong ->nip so it didn't decode\nbug messages either).\n\nFix this by avoiding using numeric labels when jumping over non-trivial\nmacros.\n\nBefore:\n\n LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV\n Modules linked in:\n CPU: 0 PID: 88 Comm: sh Not tainted 5.15.0-rc2-00034-ge057cdade6e5 #2637\n NIP: 7265677368657265 LR: c00000000006c0c8 CTR: c0000000000097f0\n REGS: c0000000fffb3a50 TRAP: 0700 Not tainted\n MSR: 9000000000021031 <SF,HV,ME,IR,DR,LE> CR: 00000700 XER: 20040000\n CFAR: c0000000000098b0 IRQMASK: 0\n GPR00: c00000000006c964 c0000000fffb3cf0 c000000001513800 0000000000000000\n GPR04: 0000000048ab0778 0000000042000000 0000000000000000 0000000000001299\n GPR08: 000001e447c718ec 0000000022424282 0000000000002710 c00000000006bee8\n GPR12: 9000000000009033 c0000000016b0000 00000000000000b0 0000000000000001\n GPR16: 0000000000000000 0000000000000002 0000000000000000 0000000000000ff8\n GPR20: 0000000000001fff 0000000000000007 0000000000000080 00007fff89d90158\n GPR24: 0000000002000000 0000000002000000 0000000000000255 0000000000000300\n GPR28: c000000001270000 0000000042000000 0000000048ab0778 c000000080647e80\n NIP [7265677368657265] 0x7265677368657265\n LR [c00000000006c0c8] ___do_page_fault+0x3f8/0xb10\n Call Trace:\n [c0000000fffb3cf0] [c00000000000bdac] soft_nmi_common+0x13c/0x1d0 (unreliable)\n --- interrupt: 700 at decrementer_common_virt+0xb8/0x230\n NIP: c0000000000098b8 LR: c00000000006c0c8 CTR: c0000000000097f0\n REGS: c0000000fffb3d60 TRAP: 0700 Not tainted\n MSR: 9000000000021031 <SF,HV,ME,IR,DR,LE> CR: 22424282 XER: 20040000\n CFAR: c0000000000098b0 IRQMASK: 0\n GPR00: c00000000006c964 0000000000002400 c000000001513800 0000000000000000\n GPR04: 0000000048ab0778 0000000042000000 0000000000000000 0000000000001299\n GPR08: 000001e447c718ec 0000000022424282 0000000000002710 c00000000006bee8\n GPR12: 9000000000009033 c0000000016b0000 00000000000000b0 0000000000000001\n GPR16: 0000000000000000 0000000000000002 0000000000000000 0000000000000ff8\n GPR20: 0000000000001fff 0000000000000007 0000000000000080 00007fff89d90158\n GPR24: 0000000002000000 0000000002000000 0000000000000255 0000000000000300\n GPR28: c000000001270000 0000000042000000 0000000048ab0778 c000000080647e80\n NIP [c0000000000098b8] decrementer_common_virt+0xb8/0x230\n LR [c00000000006c0c8] ___do_page_fault+0x3f8/0xb10\n --- interrupt: 700\n Instruction dump:\n XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX\n XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX\n ---[ end trace 6d28218e0cc3c949 ]---\n\nAfter:\n\n ------------[ cut here ]------------\n kernel BUG at arch/powerpc/kernel/exceptions-64s.S:491!\n Oops: Exception in kernel mode, sig: 5 [#1]\n LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV\n Modules linked in:\n CPU: 0 PID: 88 Comm: login Not tainted 5.15.0-rc2-00034-ge057cdade6e5-dirty #2638\n NIP: c0000000000098b8 LR: c00000000006bf04 CTR: c0000000000097f0\n REGS: c0000000fffb3d60 TRAP: 0700 Not tainted\n MSR: 9000000000021031 <SF,HV,ME,IR,DR,LE> CR: 24482227 XER: 00040000\n CFAR: c0000000000098b0 IRQMASK: 0\n GPR00: c00000000006bf04 0000000000002400 c000000001513800 c000000001271868\n GPR04: 00000000100f0d29 0000000042000000 0000000000000007 0000000000000009\n GPR08: 00000000100f0d29 0000000024482227 0000000000002710 c000000000181b3c\n GPR12: 9000000000009033 c0000000016b0000 00000000100f0d29 c000000005b22f00\n GPR16: 00000000ffff0000 0000000000000001 0000000000000009 00000000100eed90\n GPR20: 00000000100eed90 00000\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47428", url: "https://www.suse.com/security/cve/CVE-2021-47428", }, { category: "external", summary: "SUSE Bug 1225387 for CVE-2021-47428", url: "https://bugzilla.suse.com/1225387", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47428", }, { cve: "CVE-2021-47429", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47429", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/64s: Fix unrecoverable MCE calling async handler from NMI\n\nThe machine check handler is not considered NMI on 64s. The early\nhandler is the true NMI handler, and then it schedules the\nmachine_check_exception handler to run when interrupts are enabled.\n\nThis works fine except the case of an unrecoverable MCE, where the true\nNMI is taken when MSR[RI] is clear, it can not recover, so it calls\nmachine_check_exception directly so something might be done about it.\n\nCalling an async handler from NMI context can result in irq state and\nother things getting corrupted. This can also trigger the BUG at\n arch/powerpc/include/asm/interrupt.h:168\n BUG_ON(!arch_irq_disabled_regs(regs) && !(regs->msr & MSR_EE));\n\nFix this by making an _async version of the handler which is called\nin the normal case, and a NMI version that is called for unrecoverable\ninterrupts.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47429", url: "https://www.suse.com/security/cve/CVE-2021-47429", }, { category: "external", summary: "SUSE Bug 1225388 for CVE-2021-47429", url: "https://bugzilla.suse.com/1225388", }, { category: "external", summary: "SUSE Bug 1227553 for CVE-2021-47429", url: "https://bugzilla.suse.com/1227553", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47429", }, { cve: "CVE-2021-47430", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47430", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/entry: Clear X86_FEATURE_SMAP when CONFIG_X86_SMAP=n\n\nCommit\n\n 3c73b81a9164 (\"x86/entry, selftests: Further improve user entry sanity checks\")\n\nadded a warning if AC is set when in the kernel.\n\nCommit\n\n 662a0221893a3d (\"x86/entry: Fix AC assertion\")\n\nchanged the warning to only fire if the CPU supports SMAP.\n\nHowever, the warning can still trigger on a machine that supports SMAP\nbut where it's disabled in the kernel config and when running the\nsyscall_nt selftest, for example:\n\n ------------[ cut here ]------------\n WARNING: CPU: 0 PID: 49 at irqentry_enter_from_user_mode\n CPU: 0 PID: 49 Comm: init Tainted: G T 5.15.0-rc4+ #98 e6202628ee053b4f310759978284bd8bb0ce6905\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014\n RIP: 0010:irqentry_enter_from_user_mode\n ...\n Call Trace:\n ? irqentry_enter\n ? exc_general_protection\n ? asm_exc_general_protection\n ? asm_exc_general_protectio\n\nIS_ENABLED(CONFIG_X86_SMAP) could be added to the warning condition, but\neven this would not be enough in case SMAP is disabled at boot time with\nthe \"nosmap\" parameter.\n\nTo be consistent with \"nosmap\" behaviour, clear X86_FEATURE_SMAP when\n!CONFIG_X86_SMAP.\n\nFound using entry-fuzz + satrandconfig.\n\n [ bp: Massage commit message. ]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47430", url: "https://www.suse.com/security/cve/CVE-2021-47430", }, { category: "external", summary: "SUSE Bug 1225228 for CVE-2021-47430", url: "https://bugzilla.suse.com/1225228", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47430", }, { cve: "CVE-2021-47431", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47431", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix gart.bo pin_count leak\n\ngmc_v{9,10}_0_gart_disable() isn't called matched with\ncorrespoding gart_enbale function in SRIOV case. This will\nlead to gart.bo pin_count leak on driver unload.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47431", url: "https://www.suse.com/security/cve/CVE-2021-47431", }, { category: "external", summary: "SUSE Bug 1225390 for CVE-2021-47431", url: "https://bugzilla.suse.com/1225390", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47431", }, { cve: "CVE-2021-47433", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47433", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix abort logic in btrfs_replace_file_extents\n\nError injection testing uncovered a case where we'd end up with a\ncorrupt file system with a missing extent in the middle of a file. This\noccurs because the if statement to decide if we should abort is wrong.\n\nThe only way we would abort in this case is if we got a ret !=\n-EOPNOTSUPP and we called from the file clone code. However the\nprealloc code uses this path too. Instead we need to abort if there is\nan error, and the only error we _don't_ abort on is -EOPNOTSUPP and only\nif we came from the clone file code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47433", url: "https://www.suse.com/security/cve/CVE-2021-47433", }, { category: "external", summary: "SUSE Bug 1225392 for CVE-2021-47433", url: "https://bugzilla.suse.com/1225392", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47433", }, { cve: "CVE-2021-47434", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47434", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nxhci: Fix command ring pointer corruption while aborting a command\n\nThe command ring pointer is located at [6:63] bits of the command\nring control register (CRCR). All the control bits like command stop,\nabort are located at [0:3] bits. While aborting a command, we read the\nCRCR and set the abort bit and write to the CRCR. The read will always\ngive command ring pointer as all zeros. So we essentially write only\nthe control bits. Since we split the 64 bit write into two 32 bit writes,\nthere is a possibility of xHC command ring stopped before the upper\ndword (all zeros) is written. If that happens, xHC updates the upper\ndword of its internal command ring pointer with all zeros. Next time,\nwhen the command ring is restarted, we see xHC memory access failures.\nFix this issue by only writing to the lower dword of CRCR where all\ncontrol bits are located.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47434", url: "https://www.suse.com/security/cve/CVE-2021-47434", }, { category: "external", summary: "SUSE Bug 1225232 for CVE-2021-47434", url: "https://bugzilla.suse.com/1225232", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47434", }, { cve: "CVE-2021-47435", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47435", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool->elements being NULL:\n\ntask1 task2\ndo_resume\n ->do_suspend\n ->dm_wait_for_completion\n bio_endio\n\t\t\t\t ->clone_endio\n\t\t\t\t ->dm_io_dec_pending\n\t\t\t\t ->end_io_acct\n\t\t\t\t ->wakeup task1\n ->dm_swap_table\n ->__bind\n ->__bind_mempools\n ->bioset_exit\n ->mempool_exit\n ->free_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to 'struct dm_io' members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47435", url: "https://www.suse.com/security/cve/CVE-2021-47435", }, { category: "external", summary: "SUSE Bug 1225247 for CVE-2021-47435", url: "https://bugzilla.suse.com/1225247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47435", }, { cve: "CVE-2021-47436", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47436", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: musb: dsps: Fix the probe error path\n\nCommit 7c75bde329d7 (\"usb: musb: musb_dsps: request_irq() after\ninitializing musb\") has inverted the calls to\ndsps_setup_optional_vbus_irq() and dsps_create_musb_pdev() without\nupdating correctly the error path. dsps_create_musb_pdev() allocates and\nregisters a new platform device which must be unregistered and freed\nwith platform_device_unregister(), and this is missing upon\ndsps_setup_optional_vbus_irq() error.\n\nWhile on the master branch it seems not to trigger any issue, I observed\na kernel crash because of a NULL pointer dereference with a v5.10.70\nstable kernel where the patch mentioned above was backported. With this\nkernel version, -EPROBE_DEFER is returned the first time\ndsps_setup_optional_vbus_irq() is called which triggers the probe to\nerror out without unregistering the platform device. Unfortunately, on\nthe Beagle Bone Black Wireless, the platform device still living in the\nsystem is being used by the USB Ethernet gadget driver, which during the\nboot phase triggers the crash.\n\nMy limited knowledge of the musb world prevents me to revert this commit\nwhich was sent to silence a robot warning which, as far as I understand,\ndoes not make sense. The goal of this patch was to prevent an IRQ to\nfire before the platform device being registered. I think this cannot\never happen due to the fact that enabling the interrupts is done by the\n->enable() callback of the platform musb device, and this platform\ndevice must be already registered in order for the core or any other\nuser to use this callback.\n\nHence, I decided to fix the error path, which might prevent future\nerrors on mainline kernels while also fixing older ones.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47436", url: "https://www.suse.com/security/cve/CVE-2021-47436", }, { category: "external", summary: "SUSE Bug 1225244 for CVE-2021-47436", url: "https://bugzilla.suse.com/1225244", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47436", }, { cve: "CVE-2021-47437", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47437", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\niio: adis16475: fix deadlock on frequency set\n\nWith commit 39c024b51b560\n(\"iio: adis16475: improve sync scale mode handling\"), two deadlocks were\nintroduced:\n 1) The call to 'adis_write_reg_16()' was not changed to it's unlocked\n version.\n 2) The lock was not being released on the success path of the function.\n\nThis change fixes both these issues.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47437", url: "https://www.suse.com/security/cve/CVE-2021-47437", }, { category: "external", summary: "SUSE Bug 1225245 for CVE-2021-47437", url: "https://bugzilla.suse.com/1225245", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47437", }, { cve: "CVE-2021-47438", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47438", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path\n\nPrior to this patch in case mlx5_core_destroy_cq() failed it returns\nwithout completing all destroy operations and that leads to memory leak.\nInstead, complete the destroy flow before return error.\n\nAlso move mlx5_debug_cq_remove() to the beginning of mlx5_core_destroy_cq()\nto be symmetrical with mlx5_core_create_cq().\n\nkmemleak complains on:\n\nunreferenced object 0xc000000038625100 (size 64):\n comm \"ethtool\", pid 28301, jiffies 4298062946 (age 785.380s)\n hex dump (first 32 bytes):\n 60 01 48 94 00 00 00 c0 b8 05 34 c3 00 00 00 c0 `.H.......4.....\n 02 00 00 00 00 00 00 00 00 db 7d c1 00 00 00 c0 ..........}.....\n backtrace:\n [<000000009e8643cb>] add_res_tree+0xd0/0x270 [mlx5_core]\n [<00000000e7cb8e6c>] mlx5_debug_cq_add+0x5c/0xc0 [mlx5_core]\n [<000000002a12918f>] mlx5_core_create_cq+0x1d0/0x2d0 [mlx5_core]\n [<00000000cef0a696>] mlx5e_create_cq+0x210/0x3f0 [mlx5_core]\n [<000000009c642c26>] mlx5e_open_cq+0xb4/0x130 [mlx5_core]\n [<0000000058dfa578>] mlx5e_ptp_open+0x7f4/0xe10 [mlx5_core]\n [<0000000081839561>] mlx5e_open_channels+0x9cc/0x13e0 [mlx5_core]\n [<0000000009cf05d4>] mlx5e_switch_priv_channels+0xa4/0x230\n[mlx5_core]\n [<0000000042bbedd8>] mlx5e_safe_switch_params+0x14c/0x300\n[mlx5_core]\n [<0000000004bc9db8>] set_pflag_tx_port_ts+0x9c/0x160 [mlx5_core]\n [<00000000a0553443>] mlx5e_set_priv_flags+0xd0/0x1b0 [mlx5_core]\n [<00000000a8f3d84b>] ethnl_set_privflags+0x234/0x2d0\n [<00000000fd27f27c>] genl_family_rcv_msg_doit+0x108/0x1d0\n [<00000000f495e2bb>] genl_family_rcv_msg+0xe4/0x1f0\n [<00000000646c5c2c>] genl_rcv_msg+0x78/0x120\n [<00000000d53e384e>] netlink_rcv_skb+0x74/0x1a0", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47438", url: "https://www.suse.com/security/cve/CVE-2021-47438", }, { category: "external", summary: "SUSE Bug 1225229 for CVE-2021-47438", url: "https://bugzilla.suse.com/1225229", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47438", }, { cve: "CVE-2021-47439", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47439", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dsa: microchip: Added the condition for scheduling ksz_mib_read_work\n\nWhen the ksz module is installed and removed using rmmod, kernel crashes\nwith null pointer dereferrence error. During rmmod, ksz_switch_remove\nfunction tries to cancel the mib_read_workqueue using\ncancel_delayed_work_sync routine and unregister switch from dsa.\n\nDuring dsa_unregister_switch it calls ksz_mac_link_down, which in turn\nreschedules the workqueue since mib_interval is non-zero.\nDue to which queue executed after mib_interval and it tries to access\ndp->slave. But the slave is unregistered in the ksz_switch_remove\nfunction. Hence kernel crashes.\n\nTo avoid this crash, before canceling the workqueue, resetted the\nmib_interval to 0.\n\nv1 -> v2:\n-Removed the if condition in ksz_mib_read_work", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47439", url: "https://www.suse.com/security/cve/CVE-2021-47439", }, { category: "external", summary: "SUSE Bug 1225246 for CVE-2021-47439", url: "https://bugzilla.suse.com/1225246", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47439", }, { cve: "CVE-2021-47440", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47440", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: encx24j600: check error in devm_regmap_init_encx24j600\n\ndevm_regmap_init may return error which caused by like out of memory,\nthis will results in null pointer dereference later when reading\nor writing register:\n\ngeneral protection fault in encx24j600_spi_probe\nKASAN: null-ptr-deref in range [0x0000000000000090-0x0000000000000097]\nCPU: 0 PID: 286 Comm: spi-encx24j600- Not tainted 5.15.0-rc2-00142-g9978db750e31-dirty #11 9c53a778c1306b1b02359f3c2bbedc0222cba652\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014\nRIP: 0010:regcache_cache_bypass drivers/base/regmap/regcache.c:540\nCode: 54 41 89 f4 55 53 48 89 fb 48 83 ec 08 e8 26 94 a8 fe 48 8d bb a0 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 4a 03 00 00 4c 8d ab b0 00 00 00 48 8b ab a0 00\nRSP: 0018:ffffc900010476b8 EFLAGS: 00010207\nRAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: 0000000000000000\nRDX: 0000000000000012 RSI: ffff888002de0000 RDI: 0000000000000094\nRBP: ffff888013c9a000 R08: 0000000000000000 R09: fffffbfff3f9cc6a\nR10: ffffc900010476e8 R11: fffffbfff3f9cc69 R12: 0000000000000001\nR13: 000000000000000a R14: ffff888013c9af54 R15: ffff888013c9ad08\nFS: 00007ffa984ab580(0000) GS:ffff88801fe00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000055a6384136c8 CR3: 000000003bbe6003 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n encx24j600_spi_probe drivers/net/ethernet/microchip/encx24j600.c:459\n spi_probe drivers/spi/spi.c:397\n really_probe drivers/base/dd.c:517\n __driver_probe_device drivers/base/dd.c:751\n driver_probe_device drivers/base/dd.c:782\n __device_attach_driver drivers/base/dd.c:899\n bus_for_each_drv drivers/base/bus.c:427\n __device_attach drivers/base/dd.c:971\n bus_probe_device drivers/base/bus.c:487\n device_add drivers/base/core.c:3364\n __spi_add_device drivers/spi/spi.c:599\n spi_add_device drivers/spi/spi.c:641\n spi_new_device drivers/spi/spi.c:717\n new_device_store+0x18c/0x1f1 [spi_stub 4e02719357f1ff33f5a43d00630982840568e85e]\n dev_attr_store drivers/base/core.c:2074\n sysfs_kf_write fs/sysfs/file.c:139\n kernfs_fop_write_iter fs/kernfs/file.c:300\n new_sync_write fs/read_write.c:508 (discriminator 4)\n vfs_write fs/read_write.c:594\n ksys_write fs/read_write.c:648\n do_syscall_64 arch/x86/entry/common.c:50\n entry_SYSCALL_64_after_hwframe arch/x86/entry/entry_64.S:113\n\nAdd error check in devm_regmap_init_encx24j600 to avoid this situation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47440", url: "https://www.suse.com/security/cve/CVE-2021-47440", }, { category: "external", summary: "SUSE Bug 1225248 for CVE-2021-47440", url: "https://bugzilla.suse.com/1225248", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47440", }, { cve: "CVE-2021-47441", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47441", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: thermal: Fix out-of-bounds memory accesses\n\nCurrently, mlxsw allows cooling states to be set above the maximum\ncooling state supported by the driver:\n\n # cat /sys/class/thermal/thermal_zone2/cdev0/type\n mlxsw_fan\n # cat /sys/class/thermal/thermal_zone2/cdev0/max_state\n 10\n # echo 18 > /sys/class/thermal/thermal_zone2/cdev0/cur_state\n # echo $?\n 0\n\nThis results in out-of-bounds memory accesses when thermal state\ntransition statistics are enabled (CONFIG_THERMAL_STATISTICS=y), as the\ntransition table is accessed with a too large index (state) [1].\n\nAccording to the thermal maintainer, it is the responsibility of the\ndriver to reject such operations [2].\n\nTherefore, return an error when the state to be set exceeds the maximum\ncooling state supported by the driver.\n\nTo avoid dead code, as suggested by the thermal maintainer [3],\npartially revert commit a421ce088ac8 (\"mlxsw: core: Extend cooling\ndevice with cooling levels\") that tried to interpret these invalid\ncooling states (above the maximum) in a special way. The cooling levels\narray is not removed in order to prevent the fans going below 20% PWM,\nwhich would cause them to get stuck at 0% PWM.\n\n[1]\nBUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x271/0x290\nRead of size 4 at addr ffff8881052f7bf8 by task kworker/0:0/5\n\nCPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.15.0-rc3-custom-45935-gce1adf704b14 #122\nHardware name: Mellanox Technologies Ltd. \"MSN2410-CB2FO\"/\"SA000874\", BIOS 4.6.5 03/08/2016\nWorkqueue: events_freezable_power_ thermal_zone_device_check\nCall Trace:\n dump_stack_lvl+0x8b/0xb3\n print_address_description.constprop.0+0x1f/0x140\n kasan_report.cold+0x7f/0x11b\n thermal_cooling_device_stats_update+0x271/0x290\n __thermal_cdev_update+0x15e/0x4e0\n thermal_cdev_update+0x9f/0xe0\n step_wise_throttle+0x770/0xee0\n thermal_zone_device_update+0x3f6/0xdf0\n process_one_work+0xa42/0x1770\n worker_thread+0x62f/0x13e0\n kthread+0x3ee/0x4e0\n ret_from_fork+0x1f/0x30\n\nAllocated by task 1:\n kasan_save_stack+0x1b/0x40\n __kasan_kmalloc+0x7c/0x90\n thermal_cooling_device_setup_sysfs+0x153/0x2c0\n __thermal_cooling_device_register.part.0+0x25b/0x9c0\n thermal_cooling_device_register+0xb3/0x100\n mlxsw_thermal_init+0x5c5/0x7e0\n __mlxsw_core_bus_device_register+0xcb3/0x19c0\n mlxsw_core_bus_device_register+0x56/0xb0\n mlxsw_pci_probe+0x54f/0x710\n local_pci_probe+0xc6/0x170\n pci_device_probe+0x2b2/0x4d0\n really_probe+0x293/0xd10\n __driver_probe_device+0x2af/0x440\n driver_probe_device+0x51/0x1e0\n __driver_attach+0x21b/0x530\n bus_for_each_dev+0x14c/0x1d0\n bus_add_driver+0x3ac/0x650\n driver_register+0x241/0x3d0\n mlxsw_sp_module_init+0xa2/0x174\n do_one_initcall+0xee/0x5f0\n kernel_init_freeable+0x45a/0x4de\n kernel_init+0x1f/0x210\n ret_from_fork+0x1f/0x30\n\nThe buggy address belongs to the object at ffff8881052f7800\n which belongs to the cache kmalloc-1k of size 1024\nThe buggy address is located 1016 bytes inside of\n 1024-byte region [ffff8881052f7800, ffff8881052f7c00)\nThe buggy address belongs to the page:\npage:0000000052355272 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1052f0\nhead:0000000052355272 order:3 compound_mapcount:0 compound_pincount:0\nflags: 0x200000000010200(slab|head|node=0|zone=2)\nraw: 0200000000010200 ffffea0005034800 0000000300000003 ffff888100041dc0\nraw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff8881052f7a80: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc\n ffff8881052f7b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n>ffff8881052f7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n ^\n ffff8881052f7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n ffff8881052f7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n\n[2] https://lore.kernel.org/linux-pm/9aca37cb-1629-5c67-\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47441", url: "https://www.suse.com/security/cve/CVE-2021-47441", }, { category: "external", summary: "SUSE Bug 1225224 for CVE-2021-47441", url: "https://bugzilla.suse.com/1225224", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47441", }, { cve: "CVE-2021-47442", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47442", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nNFC: digital: fix possible memory leak in digital_in_send_sdd_req()\n\n'skb' is allocated in digital_in_send_sdd_req(), but not free when\ndigital_in_send_cmd() failed, which will cause memory leak. Fix it\nby freeing 'skb' if digital_in_send_cmd() return failed.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47442", url: "https://www.suse.com/security/cve/CVE-2021-47442", }, { category: "external", summary: "SUSE Bug 1225263 for CVE-2021-47442", url: "https://bugzilla.suse.com/1225263", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47442", }, { cve: "CVE-2021-47443", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47443", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nNFC: digital: fix possible memory leak in digital_tg_listen_mdaa()\n\n'params' is allocated in digital_tg_listen_mdaa(), but not free when\ndigital_send_cmd() failed, which will cause memory leak. Fix it by\nfreeing 'params' if digital_send_cmd() return failed.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47443", url: "https://www.suse.com/security/cve/CVE-2021-47443", }, { category: "external", summary: "SUSE Bug 1225262 for CVE-2021-47443", url: "https://bugzilla.suse.com/1225262", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47443", }, { cve: "CVE-2021-47444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47444", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read\n\nIn commit e11f5bd8228f (\"drm: Add support for DP 1.4 Compliance edid\ncorruption test\") the function connector_bad_edid() started assuming\nthat the memory for the EDID passed to it was big enough to hold\n`edid[0x7e] + 1` blocks of data (1 extra for the base block). It\ncompletely ignored the fact that the function was passed `num_blocks`\nwhich indicated how much memory had been allocated for the EDID.\n\nLet's fix this by adding a bounds check.\n\nThis is important for handling the case where there's an error in the\nfirst block of the EDID. In that case we will call\nconnector_bad_edid() without having re-allocated memory based on\n`edid[0x7e]`.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47444", url: "https://www.suse.com/security/cve/CVE-2021-47444", }, { category: "external", summary: "SUSE Bug 1225243 for CVE-2021-47444", url: "https://bugzilla.suse.com/1225243", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47444", }, { cve: "CVE-2021-47445", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47445", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm: Fix null pointer dereference on pointer edp\n\nThe initialization of pointer dev dereferences pointer edp before\nedp is null checked, so there is a potential null pointer deference\nissue. Fix this by only dereferencing edp after edp has been null\nchecked.\n\nAddresses-Coverity: (\"Dereference before null check\")", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47445", url: "https://www.suse.com/security/cve/CVE-2021-47445", }, { category: "external", summary: "SUSE Bug 1225261 for CVE-2021-47445", url: "https://bugzilla.suse.com/1225261", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47445", }, { cve: "CVE-2021-47446", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47446", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/a4xx: fix error handling in a4xx_gpu_init()\n\nThis code returns 1 on error instead of a negative error. It leads to\nan Oops in the caller. A second problem is that the check for\n\"if (ret != -ENODATA)\" cannot be true because \"ret\" is set to 1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47446", url: "https://www.suse.com/security/cve/CVE-2021-47446", }, { category: "external", summary: "SUSE Bug 1225240 for CVE-2021-47446", url: "https://bugzilla.suse.com/1225240", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47446", }, { cve: "CVE-2021-47447", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47447", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/a3xx: fix error handling in a3xx_gpu_init()\n\nThese error paths returned 1 on failure, instead of a negative error\ncode. This would lead to an Oops in the caller. A second problem is\nthat the check for \"if (ret != -ENODATA)\" did not work because \"ret\" was\nset to 1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47447", url: "https://www.suse.com/security/cve/CVE-2021-47447", }, { category: "external", summary: "SUSE Bug 1225260 for CVE-2021-47447", url: "https://bugzilla.suse.com/1225260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47447", }, { cve: "CVE-2021-47448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47448", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix possible stall on recvmsg()\n\nrecvmsg() can enter an infinite loop if the caller provides the\nMSG_WAITALL, the data present in the receive queue is not sufficient to\nfulfill the request, and no more data is received by the peer.\n\nWhen the above happens, mptcp_wait_data() will always return with\nno wait, as the MPTCP_DATA_READY flag checked by such function is\nset and never cleared in such code path.\n\nLeveraging the above syzbot was able to trigger an RCU stall:\n\nrcu: INFO: rcu_preempt self-detected stall on CPU\nrcu: 0-...!: (10499 ticks this GP) idle=0af/1/0x4000000000000000 softirq=10678/10678 fqs=1\n (t=10500 jiffies g=13089 q=109)\nrcu: rcu_preempt kthread starved for 10497 jiffies! g13089 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1\nrcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.\nrcu: RCU grace-period kthread stack dump:\ntask:rcu_preempt state:R running task stack:28696 pid: 14 ppid: 2 flags:0x00004000\nCall Trace:\n context_switch kernel/sched/core.c:4955 [inline]\n __schedule+0x940/0x26f0 kernel/sched/core.c:6236\n schedule+0xd3/0x270 kernel/sched/core.c:6315\n schedule_timeout+0x14a/0x2a0 kernel/time/timer.c:1881\n rcu_gp_fqs_loop+0x186/0x810 kernel/rcu/tree.c:1955\n rcu_gp_kthread+0x1de/0x320 kernel/rcu/tree.c:2128\n kthread+0x405/0x4f0 kernel/kthread.c:327\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295\nrcu: Stack dump where RCU GP kthread last ran:\nSending NMI from CPU 0 to CPUs 1:\nNMI backtrace for cpu 1\nCPU: 1 PID: 8510 Comm: syz-executor827 Not tainted 5.15.0-rc2-next-20210920-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:bytes_is_nonzero mm/kasan/generic.c:84 [inline]\nRIP: 0010:memory_is_nonzero mm/kasan/generic.c:102 [inline]\nRIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:128 [inline]\nRIP: 0010:memory_is_poisoned mm/kasan/generic.c:159 [inline]\nRIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline]\nRIP: 0010:kasan_check_range+0xc8/0x180 mm/kasan/generic.c:189\nCode: 38 00 74 ed 48 8d 50 08 eb 09 48 83 c0 01 48 39 d0 74 7a 80 38 00 74 f2 48 89 c2 b8 01 00 00 00 48 85 d2 75 56 5b 5d 41 5c c3 <48> 85 d2 74 5e 48 01 ea eb 09 48 83 c0 01 48 39 d0 74 50 80 38 00\nRSP: 0018:ffffc9000cd676c8 EFLAGS: 00000283\nRAX: ffffed100e9a110e RBX: ffffed100e9a110f RCX: ffffffff88ea062a\nRDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff888074d08870\nRBP: ffffed100e9a110e R08: 0000000000000001 R09: ffff888074d08877\nR10: ffffed100e9a110e R11: 0000000000000000 R12: ffff888074d08000\nR13: ffff888074d08000 R14: ffff888074d08088 R15: ffff888074d08000\nFS: 0000555556d8e300(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000\nS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000180 CR3: 0000000068909000 CR4: 00000000001506e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n instrument_atomic_read_write include/linux/instrumented.h:101 [inline]\n test_and_clear_bit include/asm-generic/bitops/instrumented-atomic.h:83 [inline]\n mptcp_release_cb+0x14a/0x210 net/mptcp/protocol.c:3016\n release_sock+0xb4/0x1b0 net/core/sock.c:3204\n mptcp_wait_data net/mptcp/protocol.c:1770 [inline]\n mptcp_recvmsg+0xfd1/0x27b0 net/mptcp/protocol.c:2080\n inet6_recvmsg+0x11b/0x5e0 net/ipv6/af_inet6.c:659\n sock_recvmsg_nosec net/socket.c:944 [inline]\n ____sys_recvmsg+0x527/0x600 net/socket.c:2626\n ___sys_recvmsg+0x127/0x200 net/socket.c:2670\n do_recvmmsg+0x24d/0x6d0 net/socket.c:2764\n __sys_recvmmsg net/socket.c:2843 [inline]\n __do_sys_recvmmsg net/socket.c:2866 [inline]\n __se_sys_recvmmsg net/socket.c:2859 [inline]\n __x64_sys_recvmmsg+0x20b/0x260 net/socket.c:2859\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7fc200d2\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47448", url: "https://www.suse.com/security/cve/CVE-2021-47448", }, { category: "external", summary: "SUSE Bug 1225129 for CVE-2021-47448", url: "https://bugzilla.suse.com/1225129", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47448", }, { cve: "CVE-2021-47449", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47449", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nice: fix locking for Tx timestamp tracking flush\n\nCommit 4dd0d5c33c3e (\"ice: add lock around Tx timestamp tracker flush\")\nadded a lock around the Tx timestamp tracker flow which is used to\ncleanup any left over SKBs and prepare for device removal.\n\nThis lock is problematic because it is being held around a call to\nice_clear_phy_tstamp. The clear function takes a mutex to send a PHY\nwrite command to firmware. This could lead to a deadlock if the mutex\nactually sleeps, and causes the following warning on a kernel with\npreemption debugging enabled:\n\n[ 715.419426] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:573\n[ 715.427900] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3100, name: rmmod\n[ 715.435652] INFO: lockdep is turned off.\n[ 715.439591] Preemption disabled at:\n[ 715.439594] [<0000000000000000>] 0x0\n[ 715.446678] CPU: 52 PID: 3100 Comm: rmmod Tainted: G W OE 5.15.0-rc4+ #42 bdd7ec3018e725f159ca0d372ce8c2c0e784891c\n[ 715.458058] Hardware name: Intel Corporation S2600STQ/S2600STQ, BIOS SE5C620.86B.02.01.0010.010620200716 01/06/2020\n[ 715.468483] Call Trace:\n[ 715.470940] dump_stack_lvl+0x6a/0x9a\n[ 715.474613] ___might_sleep.cold+0x224/0x26a\n[ 715.478895] __mutex_lock+0xb3/0x1440\n[ 715.482569] ? stack_depot_save+0x378/0x500\n[ 715.486763] ? ice_sq_send_cmd+0x78/0x14c0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]\n[ 715.494979] ? kfree+0xc1/0x520\n[ 715.498128] ? mutex_lock_io_nested+0x12a0/0x12a0\n[ 715.502837] ? kasan_set_free_info+0x20/0x30\n[ 715.507110] ? __kasan_slab_free+0x10b/0x140\n[ 715.511385] ? slab_free_freelist_hook+0xc7/0x220\n[ 715.516092] ? kfree+0xc1/0x520\n[ 715.519235] ? ice_deinit_lag+0x16c/0x220 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]\n[ 715.527359] ? ice_remove+0x1cf/0x6a0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]\n[ 715.535133] ? pci_device_remove+0xab/0x1d0\n[ 715.539318] ? __device_release_driver+0x35b/0x690\n[ 715.544110] ? driver_detach+0x214/0x2f0\n[ 715.548035] ? bus_remove_driver+0x11d/0x2f0\n[ 715.552309] ? pci_unregister_driver+0x26/0x250\n[ 715.556840] ? ice_module_exit+0xc/0x2f [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]\n[ 715.564799] ? __do_sys_delete_module.constprop.0+0x2d8/0x4e0\n[ 715.570554] ? do_syscall_64+0x3b/0x90\n[ 715.574303] ? entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 715.579529] ? start_flush_work+0x542/0x8f0\n[ 715.583719] ? ice_sq_send_cmd+0x78/0x14c0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]\n[ 715.591923] ice_sq_send_cmd+0x78/0x14c0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]\n[ 715.599960] ? wait_for_completion_io+0x250/0x250\n[ 715.604662] ? lock_acquire+0x196/0x200\n[ 715.608504] ? do_raw_spin_trylock+0xa5/0x160\n[ 715.612864] ice_sbq_rw_reg+0x1e6/0x2f0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]\n[ 715.620813] ? ice_reset+0x130/0x130 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]\n[ 715.628497] ? __debug_check_no_obj_freed+0x1e8/0x3c0\n[ 715.633550] ? trace_hardirqs_on+0x1c/0x130\n[ 715.637748] ice_write_phy_reg_e810+0x70/0xf0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]\n[ 715.646220] ? do_raw_spin_trylock+0xa5/0x160\n[ 715.650581] ? ice_ptp_release+0x910/0x910 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]\n[ 715.658797] ? ice_ptp_release+0x255/0x910 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]\n[ 715.667013] ice_clear_phy_tstamp+0x2c/0x110 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]\n[ 715.675403] ice_ptp_release+0x408/0x910 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]\n[ 715.683440] ice_remove+0x560/0x6a0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]\n[ 715.691037] ? _raw_spin_unlock_irqrestore+0x46/0x73\n[ 715.696005] pci_device_remove+0xab/0x1d0\n[ 715.700018] __device_release_driver+0x35b/0x690\n[ 715.704637] driver_detach+0x214/0x2f0\n[ 715.708389] bus_remove_driver+0x11d/0x2f0\n[ 715.712489] pci_unregister_driver+0x26/0x250\n[ 71\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47449", url: "https://www.suse.com/security/cve/CVE-2021-47449", }, { category: "external", summary: "SUSE Bug 1225259 for CVE-2021-47449", url: "https://bugzilla.suse.com/1225259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47449", }, { cve: "CVE-2021-47450", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47450", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Fix host stage-2 PGD refcount\n\nThe KVM page-table library refcounts the pages of concatenated stage-2\nPGDs individually. However, when running KVM in protected mode, the\nhost's stage-2 PGD is currently managed by EL2 as a single high-order\ncompound page, which can cause the refcount of the tail pages to reach 0\nwhen they shouldn't, hence corrupting the page-table.\n\nFix this by introducing a new hyp_split_page() helper in the EL2 page\nallocator (matching the kernel's split_page() function), and make use of\nit from host_s2_zalloc_pages_exact().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47450", url: "https://www.suse.com/security/cve/CVE-2021-47450", }, { category: "external", summary: "SUSE Bug 1225258 for CVE-2021-47450", url: "https://bugzilla.suse.com/1225258", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47450", }, { cve: "CVE-2021-47451", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47451", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value\n\nCurrently, when the rule related to IDLETIMER is added, idletimer_tg timer\nstructure is initialized by kmalloc on executing idletimer_tg_create\nfunction. However, in this process timer->timer_type is not defined to\na specific value. Thus, timer->timer_type has garbage value and it occurs\nkernel panic. So, this commit fixes the panic by initializing\ntimer->timer_type using kzalloc instead of kmalloc.\n\nTest commands:\n # iptables -A OUTPUT -j IDLETIMER --timeout 1 --label test\n $ cat /sys/class/xt_idletimer/timers/test\n Killed\n\nSplat looks like:\n BUG: KASAN: user-memory-access in alarm_expires_remaining+0x49/0x70\n Read of size 8 at addr 0000002e8c7bc4c8 by task cat/917\n CPU: 12 PID: 917 Comm: cat Not tainted 5.14.0+ #3 79940a339f71eb14fc81aee1757a20d5bf13eb0e\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-1ubuntu1.1 04/01/2014\n Call Trace:\n dump_stack_lvl+0x6e/0x9c\n kasan_report.cold+0x112/0x117\n ? alarm_expires_remaining+0x49/0x70\n __asan_load8+0x86/0xb0\n alarm_expires_remaining+0x49/0x70\n idletimer_tg_show+0xe5/0x19b [xt_IDLETIMER 11219304af9316a21bee5ba9d58f76a6b9bccc6d]\n dev_attr_show+0x3c/0x60\n sysfs_kf_seq_show+0x11d/0x1f0\n ? device_remove_bin_file+0x20/0x20\n kernfs_seq_show+0xa4/0xb0\n seq_read_iter+0x29c/0x750\n kernfs_fop_read_iter+0x25a/0x2c0\n ? __fsnotify_parent+0x3d1/0x570\n ? iov_iter_init+0x70/0x90\n new_sync_read+0x2a7/0x3d0\n ? __x64_sys_llseek+0x230/0x230\n ? rw_verify_area+0x81/0x150\n vfs_read+0x17b/0x240\n ksys_read+0xd9/0x180\n ? vfs_write+0x460/0x460\n ? do_syscall_64+0x16/0xc0\n ? lockdep_hardirqs_on+0x79/0x120\n __x64_sys_read+0x43/0x50\n do_syscall_64+0x3b/0xc0\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n RIP: 0033:0x7f0cdc819142\n Code: c0 e9 c2 fe ff ff 50 48 8d 3d 3a ca 0a 00 e8 f5 19 02 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24\n RSP: 002b:00007fff28eee5b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000\n RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007f0cdc819142\n RDX: 0000000000020000 RSI: 00007f0cdc032000 RDI: 0000000000000003\n RBP: 00007f0cdc032000 R08: 00007f0cdc031010 R09: 0000000000000000\n R10: 0000000000000022 R11: 0000000000000246 R12: 00005607e9ee31f0\n R13: 0000000000000003 R14: 0000000000020000 R15: 0000000000020000", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47451", url: "https://www.suse.com/security/cve/CVE-2021-47451", }, { category: "external", summary: "SUSE Bug 1225237 for CVE-2021-47451", url: "https://bugzilla.suse.com/1225237", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47451", }, { cve: "CVE-2021-47452", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47452", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: skip netdev events generated on netns removal\n\nsyzbot reported following (harmless) WARN:\n\n WARNING: CPU: 1 PID: 2648 at net/netfilter/core.c:468\n nft_netdev_unregister_hooks net/netfilter/nf_tables_api.c:230 [inline]\n nf_tables_unregister_hook include/net/netfilter/nf_tables.h:1090 [inline]\n __nft_release_basechain+0x138/0x640 net/netfilter/nf_tables_api.c:9524\n nft_netdev_event net/netfilter/nft_chain_filter.c:351 [inline]\n nf_tables_netdev_event+0x521/0x8a0 net/netfilter/nft_chain_filter.c:382\n\nreproducer:\nunshare -n bash -c 'ip link add br0 type bridge; nft add table netdev t ; \\\n nft add chain netdev t ingress \\{ type filter hook ingress device \"br0\" \\\n priority 0\\; policy drop\\; \\}'\n\nProblem is that when netns device exit hooks create the UNREGISTER\nevent, the .pre_exit hook for nf_tables core has already removed the\nbase hook. Notifier attempts to do this again.\n\nThe need to do base hook unregister unconditionally was needed in the past,\nbecause notifier was last stage where reg->dev dereference was safe.\n\nNow that nf_tables does the hook removal in .pre_exit, this isn't\nneeded anymore.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47452", url: "https://www.suse.com/security/cve/CVE-2021-47452", }, { category: "external", summary: "SUSE Bug 1225257 for CVE-2021-47452", url: "https://bugzilla.suse.com/1225257", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47452", }, { cve: "CVE-2021-47453", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47453", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Avoid crash from unnecessary IDA free\n\nIn the remove path, there is an attempt to free the aux_idx IDA whether\nit was allocated or not. This can potentially cause a crash when\nunloading the driver on systems that do not initialize support for RDMA.\nBut, this free cannot be gated by the status bit for RDMA, since it is\nallocated if the driver detects support for RDMA at probe time, but the\ndriver can enter into a state where RDMA is not supported after the IDA\nhas been allocated at probe time and this would lead to a memory leak.\n\nInitialize aux_idx to an invalid value and check for a valid value when\nunloading to determine if an IDA free is necessary.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47453", url: "https://www.suse.com/security/cve/CVE-2021-47453", }, { category: "external", summary: "SUSE Bug 1225239 for CVE-2021-47453", url: "https://bugzilla.suse.com/1225239", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47453", }, { cve: "CVE-2021-47454", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47454", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/smp: do not decrement idle task preempt count in CPU offline\n\nWith PREEMPT_COUNT=y, when a CPU is offlined and then onlined again, we\nget:\n\nBUG: scheduling while atomic: swapper/1/0/0x00000000\nno locks held by swapper/1/0.\nCPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.15.0-rc2+ #100\nCall Trace:\n dump_stack_lvl+0xac/0x108\n __schedule_bug+0xac/0xe0\n __schedule+0xcf8/0x10d0\n schedule_idle+0x3c/0x70\n do_idle+0x2d8/0x4a0\n cpu_startup_entry+0x38/0x40\n start_secondary+0x2ec/0x3a0\n start_secondary_prolog+0x10/0x14\n\nThis is because powerpc's arch_cpu_idle_dead() decrements the idle task's\npreempt count, for reasons explained in commit a7c2bb8279d2 (\"powerpc:\nRe-enable preemption before cpu_die()\"), specifically \"start_secondary()\nexpects a preempt_count() of 0.\"\n\nHowever, since commit 2c669ef6979c (\"powerpc/preempt: Don't touch the idle\ntask's preempt_count during hotplug\") and commit f1a0a376ca0c (\"sched/core:\nInitialize the idle task with preemption disabled\"), that justification no\nlonger holds.\n\nThe idle task isn't supposed to re-enable preemption, so remove the\nvestigial preempt_enable() from the CPU offline path.\n\nTested with pseries and powernv in qemu, and pseries on PowerVM.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47454", url: "https://www.suse.com/security/cve/CVE-2021-47454", }, { category: "external", summary: "SUSE Bug 1225255 for CVE-2021-47454", url: "https://bugzilla.suse.com/1225255", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47454", }, { cve: "CVE-2021-47455", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47455", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: Fix possible memory leak in ptp_clock_register()\n\nI got memory leak as follows when doing fault injection test:\n\nunreferenced object 0xffff88800906c618 (size 8):\n comm \"i2c-idt82p33931\", pid 4421, jiffies 4294948083 (age 13.188s)\n hex dump (first 8 bytes):\n 70 74 70 30 00 00 00 00 ptp0....\n backtrace:\n [<00000000312ed458>] __kmalloc_track_caller+0x19f/0x3a0\n [<0000000079f6e2ff>] kvasprintf+0xb5/0x150\n [<0000000026aae54f>] kvasprintf_const+0x60/0x190\n [<00000000f323a5f7>] kobject_set_name_vargs+0x56/0x150\n [<000000004e35abdd>] dev_set_name+0xc0/0x100\n [<00000000f20cfe25>] ptp_clock_register+0x9f4/0xd30 [ptp]\n [<000000008bb9f0de>] idt82p33_probe.cold+0x8b6/0x1561 [ptp_idt82p33]\n\nWhen posix_clock_register() returns an error, the name allocated\nin dev_set_name() will be leaked, the put_device() should be used\nto give up the device reference, then the name will be freed in\nkobject_cleanup() and other memory will be freed in ptp_clock_release().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47455", url: "https://www.suse.com/security/cve/CVE-2021-47455", }, { category: "external", summary: "SUSE Bug 1225254 for CVE-2021-47455", url: "https://bugzilla.suse.com/1225254", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47455", }, { cve: "CVE-2021-47456", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47456", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: peak_pci: peak_pci_remove(): fix UAF\n\nWhen remove the module peek_pci, referencing 'chan' again after\nreleasing 'dev' will cause UAF.\n\nFix this by releasing 'dev' later.\n\nThe following log reveals it:\n\n[ 35.961814 ] BUG: KASAN: use-after-free in peak_pci_remove+0x16f/0x270 [peak_pci]\n[ 35.963414 ] Read of size 8 at addr ffff888136998ee8 by task modprobe/5537\n[ 35.965513 ] Call Trace:\n[ 35.965718 ] dump_stack_lvl+0xa8/0xd1\n[ 35.966028 ] print_address_description+0x87/0x3b0\n[ 35.966420 ] kasan_report+0x172/0x1c0\n[ 35.966725 ] ? peak_pci_remove+0x16f/0x270 [peak_pci]\n[ 35.967137 ] ? trace_irq_enable_rcuidle+0x10/0x170\n[ 35.967529 ] ? peak_pci_remove+0x16f/0x270 [peak_pci]\n[ 35.967945 ] __asan_report_load8_noabort+0x14/0x20\n[ 35.968346 ] peak_pci_remove+0x16f/0x270 [peak_pci]\n[ 35.968752 ] pci_device_remove+0xa9/0x250", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47456", url: "https://www.suse.com/security/cve/CVE-2021-47456", }, { category: "external", summary: "SUSE Bug 1225256 for CVE-2021-47456", url: "https://bugzilla.suse.com/1225256", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47456", }, { cve: "CVE-2021-47457", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47457", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: isotp: isotp_sendmsg(): add result check for wait_event_interruptible()\n\nUsing wait_event_interruptible() to wait for complete transmission,\nbut do not check the result of wait_event_interruptible() which can be\ninterrupted. It will result in TX buffer has multiple accessors and\nthe later process interferes with the previous process.\n\nFollowing is one of the problems reported by syzbot.\n\n=============================================================\nWARNING: CPU: 0 PID: 0 at net/can/isotp.c:840 isotp_tx_timer_handler+0x2e0/0x4c0\nCPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.13.0-rc7+ #68\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1 04/01/2014\nRIP: 0010:isotp_tx_timer_handler+0x2e0/0x4c0\nCall Trace:\n <IRQ>\n ? isotp_setsockopt+0x390/0x390\n __hrtimer_run_queues+0xb8/0x610\n hrtimer_run_softirq+0x91/0xd0\n ? rcu_read_lock_sched_held+0x4d/0x80\n __do_softirq+0xe8/0x553\n irq_exit_rcu+0xf8/0x100\n sysvec_apic_timer_interrupt+0x9e/0xc0\n </IRQ>\n asm_sysvec_apic_timer_interrupt+0x12/0x20\n\nAdd result check for wait_event_interruptible() in isotp_sendmsg()\nto avoid multiple accessers for tx buffer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47457", url: "https://www.suse.com/security/cve/CVE-2021-47457", }, { category: "external", summary: "SUSE Bug 1225235 for CVE-2021-47457", url: "https://bugzilla.suse.com/1225235", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47457", }, { cve: "CVE-2021-47458", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47458", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: mount fails with buffer overflow in strlen\n\nStarting with kernel 5.11 built with CONFIG_FORTIFY_SOURCE mouting an\nocfs2 filesystem with either o2cb or pcmk cluster stack fails with the\ntrace below. Problem seems to be that strings for cluster stack and\ncluster name are not guaranteed to be null terminated in the disk\nrepresentation, while strlcpy assumes that the source string is always\nnull terminated. This causes a read outside of the source string\ntriggering the buffer overflow detection.\n\n detected buffer overflow in strlen\n ------------[ cut here ]------------\n kernel BUG at lib/string.c:1149!\n invalid opcode: 0000 [#1] SMP PTI\n CPU: 1 PID: 910 Comm: mount.ocfs2 Not tainted 5.14.0-1-amd64 #1\n Debian 5.14.6-2\n RIP: 0010:fortify_panic+0xf/0x11\n ...\n Call Trace:\n ocfs2_initialize_super.isra.0.cold+0xc/0x18 [ocfs2]\n ocfs2_fill_super+0x359/0x19b0 [ocfs2]\n mount_bdev+0x185/0x1b0\n legacy_get_tree+0x27/0x40\n vfs_get_tree+0x25/0xb0\n path_mount+0x454/0xa20\n __x64_sys_mount+0x103/0x140\n do_syscall_64+0x3b/0xc0\n entry_SYSCALL_64_after_hwframe+0x44/0xae", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47458", url: "https://www.suse.com/security/cve/CVE-2021-47458", }, { category: "external", summary: "SUSE Bug 1225252 for CVE-2021-47458", url: "https://bugzilla.suse.com/1225252", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47458", }, { cve: "CVE-2021-47459", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47459", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv\n\nIt will trigger UAF for rx_kref of j1939_priv as following.\n\n cpu0 cpu1\nj1939_sk_bind(socket0, ndev0, ...)\nj1939_netdev_start\n j1939_sk_bind(socket1, ndev0, ...)\n j1939_netdev_start\nj1939_priv_set\n j1939_priv_get_by_ndev_locked\nj1939_jsk_add\n.....\nj1939_netdev_stop\nkref_put_lock(&priv->rx_kref, ...)\n kref_get(&priv->rx_kref, ...)\n REFCOUNT_WARN(\"addition on 0;...\")\n\n====================================================\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 1 PID: 20874 at lib/refcount.c:25 refcount_warn_saturate+0x169/0x1e0\nRIP: 0010:refcount_warn_saturate+0x169/0x1e0\nCall Trace:\n j1939_netdev_start+0x68b/0x920\n j1939_sk_bind+0x426/0xeb0\n ? security_socket_bind+0x83/0xb0\n\nThe rx_kref's kref_get() and kref_put() should use j1939_netdev_lock to\nprotect.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47459", url: "https://www.suse.com/security/cve/CVE-2021-47459", }, { category: "external", summary: "SUSE Bug 1225253 for CVE-2021-47459", url: "https://bugzilla.suse.com/1225253", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47459", }, { cve: "CVE-2021-47460", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47460", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix data corruption after conversion from inline format\n\nCommit 6dbf7bb55598 (\"fs: Don't invalidate page buffers in\nblock_write_full_page()\") uncovered a latent bug in ocfs2 conversion\nfrom inline inode format to a normal inode format.\n\nThe code in ocfs2_convert_inline_data_to_extents() attempts to zero out\nthe whole cluster allocated for file data by grabbing, zeroing, and\ndirtying all pages covering this cluster. However these pages are\nbeyond i_size, thus writeback code generally ignores these dirty pages\nand no blocks were ever actually zeroed on the disk.\n\nThis oversight was fixed by commit 693c241a5f6a (\"ocfs2: No need to zero\npages past i_size.\") for standard ocfs2 write path, inline conversion\npath was apparently forgotten; the commit log also has a reasoning why\nthe zeroing actually is not needed.\n\nAfter commit 6dbf7bb55598, things became worse as writeback code stopped\ninvalidating buffers on pages beyond i_size and thus these pages end up\nwith clean PageDirty bit but with buffers attached to these pages being\nstill dirty. So when a file is converted from inline format, then\nwriteback triggers, and then the file is grown so that these pages\nbecome valid, the invalid dirtiness state is preserved,\nmark_buffer_dirty() does nothing on these pages (buffers are already\ndirty) but page is never written back because it is clean. So data\nwritten to these pages is lost once pages are reclaimed.\n\nSimple reproducer for the problem is:\n\n xfs_io -f -c \"pwrite 0 2000\" -c \"pwrite 2000 2000\" -c \"fsync\" \\\n -c \"pwrite 4000 2000\" ocfs2_file\n\nAfter unmounting and mounting the fs again, you can observe that end of\n'ocfs2_file' has lost its contents.\n\nFix the problem by not doing the pointless zeroing during conversion\nfrom inline format similarly as in the standard write path.\n\n[akpm@linux-foundation.org: fix whitespace, per Joseph]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47460", url: "https://www.suse.com/security/cve/CVE-2021-47460", }, { category: "external", summary: "SUSE Bug 1225251 for CVE-2021-47460", url: "https://bugzilla.suse.com/1225251", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47460", }, { cve: "CVE-2021-47461", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47461", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nuserfaultfd: fix a race between writeprotect and exit_mmap()\n\nA race is possible when a process exits, its VMAs are removed by\nexit_mmap() and at the same time userfaultfd_writeprotect() is called.\n\nThe race was detected by KASAN on a development kernel, but it appears\nto be possible on vanilla kernels as well.\n\nUse mmget_not_zero() to prevent the race as done in other userfaultfd\noperations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47461", url: "https://www.suse.com/security/cve/CVE-2021-47461", }, { category: "external", summary: "SUSE Bug 1225249 for CVE-2021-47461", url: "https://bugzilla.suse.com/1225249", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47461", }, { cve: "CVE-2021-47462", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47462", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/mempolicy: do not allow illegal MPOL_F_NUMA_BALANCING | MPOL_LOCAL in mbind()\n\nsyzbot reported access to unitialized memory in mbind() [1]\n\nIssue came with commit bda420b98505 (\"numa balancing: migrate on fault\namong multiple bound nodes\")\n\nThis commit added a new bit in MPOL_MODE_FLAGS, but only checked valid\ncombination (MPOL_F_NUMA_BALANCING can only be used with MPOL_BIND) in\ndo_set_mempolicy()\n\nThis patch moves the check in sanitize_mpol_flags() so that it is also\nused by mbind()\n\n [1]\n BUG: KMSAN: uninit-value in __mpol_equal+0x567/0x590 mm/mempolicy.c:2260\n __mpol_equal+0x567/0x590 mm/mempolicy.c:2260\n mpol_equal include/linux/mempolicy.h:105 [inline]\n vma_merge+0x4a1/0x1e60 mm/mmap.c:1190\n mbind_range+0xcc8/0x1e80 mm/mempolicy.c:811\n do_mbind+0xf42/0x15f0 mm/mempolicy.c:1333\n kernel_mbind mm/mempolicy.c:1483 [inline]\n __do_sys_mbind mm/mempolicy.c:1490 [inline]\n __se_sys_mbind+0x437/0xb80 mm/mempolicy.c:1486\n __x64_sys_mbind+0x19d/0x200 mm/mempolicy.c:1486\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\n Uninit was created at:\n slab_alloc_node mm/slub.c:3221 [inline]\n slab_alloc mm/slub.c:3230 [inline]\n kmem_cache_alloc+0x751/0xff0 mm/slub.c:3235\n mpol_new mm/mempolicy.c:293 [inline]\n do_mbind+0x912/0x15f0 mm/mempolicy.c:1289\n kernel_mbind mm/mempolicy.c:1483 [inline]\n __do_sys_mbind mm/mempolicy.c:1490 [inline]\n __se_sys_mbind+0x437/0xb80 mm/mempolicy.c:1486\n __x64_sys_mbind+0x19d/0x200 mm/mempolicy.c:1486\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n =====================================================\n Kernel panic - not syncing: panic_on_kmsan set ...\n CPU: 0 PID: 15049 Comm: syz-executor.0 Tainted: G B 5.15.0-rc2-syzkaller #0\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\n Call Trace:\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x1ff/0x28e lib/dump_stack.c:106\n dump_stack+0x25/0x28 lib/dump_stack.c:113\n panic+0x44f/0xdeb kernel/panic.c:232\n kmsan_report+0x2ee/0x300 mm/kmsan/report.c:186\n __msan_warning+0xd7/0x150 mm/kmsan/instrumentation.c:208\n __mpol_equal+0x567/0x590 mm/mempolicy.c:2260\n mpol_equal include/linux/mempolicy.h:105 [inline]\n vma_merge+0x4a1/0x1e60 mm/mmap.c:1190\n mbind_range+0xcc8/0x1e80 mm/mempolicy.c:811\n do_mbind+0xf42/0x15f0 mm/mempolicy.c:1333\n kernel_mbind mm/mempolicy.c:1483 [inline]\n __do_sys_mbind mm/mempolicy.c:1490 [inline]\n __se_sys_mbind+0x437/0xb80 mm/mempolicy.c:1486\n __x64_sys_mbind+0x19d/0x200 mm/mempolicy.c:1486\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82\n entry_SYSCALL_64_after_hwframe+0x44/0xae", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47462", url: "https://www.suse.com/security/cve/CVE-2021-47462", }, { category: "external", summary: "SUSE Bug 1225250 for CVE-2021-47462", url: "https://bugzilla.suse.com/1225250", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47462", }, { cve: "CVE-2021-47463", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47463", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/secretmem: fix NULL page->mapping dereference in page_is_secretmem()\n\nCheck for a NULL page->mapping before dereferencing the mapping in\npage_is_secretmem(), as the page's mapping can be nullified while gup()\nis running, e.g. by reclaim or truncation.\n\n BUG: kernel NULL pointer dereference, address: 0000000000000068\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 0 P4D 0\n Oops: 0000 [#1] PREEMPT SMP NOPTI\n CPU: 6 PID: 4173897 Comm: CPU 3/KVM Tainted: G W\n RIP: 0010:internal_get_user_pages_fast+0x621/0x9d0\n Code: <48> 81 7a 68 80 08 04 bc 0f 85 21 ff ff 8 89 c7 be\n RSP: 0018:ffffaa90087679b0 EFLAGS: 00010046\n RAX: ffffe3f37905b900 RBX: 00007f2dd561e000 RCX: ffffe3f37905b934\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffe3f37905b900\n ...\n CR2: 0000000000000068 CR3: 00000004c5898003 CR4: 00000000001726e0\n Call Trace:\n get_user_pages_fast_only+0x13/0x20\n hva_to_pfn+0xa9/0x3e0\n try_async_pf+0xa1/0x270\n direct_page_fault+0x113/0xad0\n kvm_mmu_page_fault+0x69/0x680\n vmx_handle_exit+0xe1/0x5d0\n kvm_arch_vcpu_ioctl_run+0xd81/0x1c70\n kvm_vcpu_ioctl+0x267/0x670\n __x64_sys_ioctl+0x83/0xa0\n do_syscall_64+0x56/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47463", url: "https://www.suse.com/security/cve/CVE-2021-47463", }, { category: "external", summary: "SUSE Bug 1225127 for CVE-2021-47463", url: "https://bugzilla.suse.com/1225127", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47463", }, { cve: "CVE-2021-47464", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47464", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\naudit: fix possible null-pointer dereference in audit_filter_rules\n\nFix possible null-pointer dereference in audit_filter_rules.\n\naudit_filter_rules() error: we previously assumed 'ctx' could be null", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47464", url: "https://www.suse.com/security/cve/CVE-2021-47464", }, { category: "external", summary: "SUSE Bug 1225393 for CVE-2021-47464", url: "https://bugzilla.suse.com/1225393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47464", }, { cve: "CVE-2021-47465", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47465", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest()\n\nIn commit 10d91611f426 (\"powerpc/64s: Reimplement book3s idle code in\nC\") kvm_start_guest() became idle_kvm_start_guest(). The old code\nallocated a stack frame on the emergency stack, but didn't use the\nframe to store anything, and also didn't store anything in its caller's\nframe.\n\nidle_kvm_start_guest() on the other hand is written more like a normal C\nfunction, it creates a frame on entry, and also stores CR/LR into its\ncallers frame (per the ABI). The problem is that there is no caller\nframe on the emergency stack.\n\nThe emergency stack for a given CPU is allocated with:\n\n paca_ptrs[i]->emergency_sp = alloc_stack(limit, i) + THREAD_SIZE;\n\nSo emergency_sp actually points to the first address above the emergency\nstack allocation for a given CPU, we must not store above it without\nfirst decrementing it to create a frame. This is different to the\nregular kernel stack, paca->kstack, which is initialised to point at an\ninitial frame that is ready to use.\n\nidle_kvm_start_guest() stores the backchain, CR and LR all of which\nwrite outside the allocation for the emergency stack. It then creates a\nstack frame and saves the non-volatile registers. Unfortunately the\nframe it creates is not large enough to fit the non-volatiles, and so\nthe saving of the non-volatile registers also writes outside the\nemergency stack allocation.\n\nThe end result is that we corrupt whatever is at 0-24 bytes, and 112-248\nbytes above the emergency stack allocation.\n\nIn practice this has gone unnoticed because the memory immediately above\nthe emergency stack happens to be used for other stack allocations,\neither another CPUs mc_emergency_sp or an IRQ stack. See the order of\ncalls to irqstack_early_init() and emergency_stack_init().\n\nThe low addresses of another stack are the top of that stack, and so are\nonly used if that stack is under extreme pressue, which essentially\nnever happens in practice - and if it did there's a high likelyhood we'd\ncrash due to that stack overflowing.\n\nStill, we shouldn't be corrupting someone else's stack, and it is purely\nluck that we aren't corrupting something else.\n\nTo fix it we save CR/LR into the caller's frame using the existing r1 on\nentry, we then create a SWITCH_FRAME_SIZE frame (which has space for\npt_regs) on the emergency stack with the backchain pointing to the\nexisting stack, and then finally we switch to the new frame on the\nemergency stack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47465", url: "https://www.suse.com/security/cve/CVE-2021-47465", }, { category: "external", summary: "SUSE Bug 1225341 for CVE-2021-47465", url: "https://bugzilla.suse.com/1225341", }, { category: "external", summary: "SUSE Bug 1227904 for CVE-2021-47465", url: "https://bugzilla.suse.com/1227904", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2021-47465", }, { cve: "CVE-2021-47466", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47466", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmm, slub: fix potential memoryleak in kmem_cache_open()\n\nIn error path, the random_seq of slub cache might be leaked. Fix this\nby using __kmem_cache_release() to release all the relevant resources.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47466", url: "https://www.suse.com/security/cve/CVE-2021-47466", }, { category: "external", summary: "SUSE Bug 1225342 for CVE-2021-47466", url: "https://bugzilla.suse.com/1225342", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47466", }, { cve: "CVE-2021-47467", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47467", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nkunit: fix reference count leak in kfree_at_end\n\nThe reference counting issue happens in the normal path of\nkfree_at_end(). When kunit_alloc_and_get_resource() is invoked, the\nfunction forgets to handle the returned resource object, whose refcount\nincreased inside, causing a refcount leak.\n\nFix this issue by calling kunit_alloc_resource() instead of\nkunit_alloc_and_get_resource().\n\nFixed the following when applying:\nShuah Khan <skhan@linuxfoundation.org>\n\nCHECK: Alignment should match open parenthesis\n+\tkunit_alloc_resource(test, NULL, kfree_res_free, GFP_KERNEL,\n \t\t\t\t (void *)to_free);", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47467", url: "https://www.suse.com/security/cve/CVE-2021-47467", }, { category: "external", summary: "SUSE Bug 1225344 for CVE-2021-47467", url: "https://bugzilla.suse.com/1225344", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 0, baseSeverity: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47467", }, { cve: "CVE-2021-47468", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47468", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nisdn: mISDN: Fix sleeping function called from invalid context\n\nThe driver can call card->isac.release() function from an atomic\ncontext.\n\nFix this by calling this function after releasing the lock.\n\nThe following log reveals it:\n\n[ 44.168226 ] BUG: sleeping function called from invalid context at kernel/workqueue.c:3018\n[ 44.168941 ] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 5475, name: modprobe\n[ 44.169574 ] INFO: lockdep is turned off.\n[ 44.169899 ] irq event stamp: 0\n[ 44.170160 ] hardirqs last enabled at (0): [<0000000000000000>] 0x0\n[ 44.170627 ] hardirqs last disabled at (0): [<ffffffff814209ed>] copy_process+0x132d/0x3e00\n[ 44.171240 ] softirqs last enabled at (0): [<ffffffff81420a1a>] copy_process+0x135a/0x3e00\n[ 44.171852 ] softirqs last disabled at (0): [<0000000000000000>] 0x0\n[ 44.172318 ] Preemption disabled at:\n[ 44.172320 ] [<ffffffffa009b0a9>] nj_release+0x69/0x500 [netjet]\n[ 44.174441 ] Call Trace:\n[ 44.174630 ] dump_stack_lvl+0xa8/0xd1\n[ 44.174912 ] dump_stack+0x15/0x17\n[ 44.175166 ] ___might_sleep+0x3a2/0x510\n[ 44.175459 ] ? nj_release+0x69/0x500 [netjet]\n[ 44.175791 ] __might_sleep+0x82/0xe0\n[ 44.176063 ] ? start_flush_work+0x20/0x7b0\n[ 44.176375 ] start_flush_work+0x33/0x7b0\n[ 44.176672 ] ? trace_irq_enable_rcuidle+0x85/0x170\n[ 44.177034 ] ? kasan_quarantine_put+0xaa/0x1f0\n[ 44.177372 ] ? kasan_quarantine_put+0xaa/0x1f0\n[ 44.177711 ] __flush_work+0x11a/0x1a0\n[ 44.177991 ] ? flush_work+0x20/0x20\n[ 44.178257 ] ? lock_release+0x13c/0x8f0\n[ 44.178550 ] ? __kasan_check_write+0x14/0x20\n[ 44.178872 ] ? do_raw_spin_lock+0x148/0x360\n[ 44.179187 ] ? read_lock_is_recursive+0x20/0x20\n[ 44.179530 ] ? __kasan_check_read+0x11/0x20\n[ 44.179846 ] ? do_raw_spin_unlock+0x55/0x900\n[ 44.180168 ] ? ____kasan_slab_free+0x116/0x140\n[ 44.180505 ] ? _raw_spin_unlock_irqrestore+0x41/0x60\n[ 44.180878 ] ? skb_queue_purge+0x1a3/0x1c0\n[ 44.181189 ] ? kfree+0x13e/0x290\n[ 44.181438 ] flush_work+0x17/0x20\n[ 44.181695 ] mISDN_freedchannel+0xe8/0x100\n[ 44.182006 ] isac_release+0x210/0x260 [mISDNipac]\n[ 44.182366 ] nj_release+0xf6/0x500 [netjet]\n[ 44.182685 ] nj_remove+0x48/0x70 [netjet]\n[ 44.182989 ] pci_device_remove+0xa9/0x250", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47468", url: "https://www.suse.com/security/cve/CVE-2021-47468", }, { category: "external", summary: "SUSE Bug 1225346 for CVE-2021-47468", url: "https://bugzilla.suse.com/1225346", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47468", }, { cve: "CVE-2021-47469", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47469", }, ], notes: [ { category: "general", text: "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47469", url: "https://www.suse.com/security/cve/CVE-2021-47469", }, { category: "external", summary: "SUSE Bug 1225347 for CVE-2021-47469", url: "https://bugzilla.suse.com/1225347", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47469", }, { cve: "CVE-2021-47470", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47470", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmm, slub: fix potential use-after-free in slab_debugfs_fops\n\nWhen sysfs_slab_add failed, we shouldn't call debugfs_slab_add() for s\nbecause s will be freed soon. And slab_debugfs_fops will use s later\nleading to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47470", url: "https://www.suse.com/security/cve/CVE-2021-47470", }, { category: "external", summary: "SUSE Bug 1225186 for CVE-2021-47470", url: "https://bugzilla.suse.com/1225186", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47470", }, { cve: "CVE-2021-47471", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47471", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: mxsfb: Fix NULL pointer dereference crash on unload\n\nThe mxsfb->crtc.funcs may already be NULL when unloading the driver,\nin which case calling mxsfb_irq_disable() via drm_irq_uninstall() from\nmxsfb_unload() leads to NULL pointer dereference.\n\nSince all we care about is masking the IRQ and mxsfb->base is still\nvalid, just use that to clear and mask the IRQ.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47471", url: "https://www.suse.com/security/cve/CVE-2021-47471", }, { category: "external", summary: "SUSE Bug 1225187 for CVE-2021-47471", url: "https://bugzilla.suse.com/1225187", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47471", }, { cve: "CVE-2021-47472", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47472", }, ], notes: [ { category: "general", text: "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47472", url: "https://www.suse.com/security/cve/CVE-2021-47472", }, { category: "external", summary: "SUSE Bug 1225189 for CVE-2021-47472", url: "https://bugzilla.suse.com/1225189", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47472", }, { cve: "CVE-2021-47473", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47473", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()\n\nCommit 8c0eb596baa5 (\"[SCSI] qla2xxx: Fix a memory leak in an error path of\nqla2x00_process_els()\"), intended to change:\n\n bsg_job->request->msgcode == FC_BSG_HST_ELS_NOLOGIN\n\n\n bsg_job->request->msgcode != FC_BSG_RPT_ELS\n\nbut changed it to:\n\n bsg_job->request->msgcode == FC_BSG_RPT_ELS\n\ninstead.\n\nChange the == to a != to avoid leaking the fcport structure or freeing\nunallocated memory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47473", url: "https://www.suse.com/security/cve/CVE-2021-47473", }, { category: "external", summary: "SUSE Bug 1225192 for CVE-2021-47473", url: "https://bugzilla.suse.com/1225192", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47473", }, { cve: "CVE-2021-47474", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47474", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: vmk80xx: fix bulk-buffer overflow\n\nThe driver is using endpoint-sized buffers but must not assume that the\ntx and rx buffers are of equal size or a malicious device could overflow\nthe slab-allocated receive buffer when doing bulk transfers.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47474", url: "https://www.suse.com/security/cve/CVE-2021-47474", }, { category: "external", summary: "SUSE Bug 1224915 for CVE-2021-47474", url: "https://bugzilla.suse.com/1224915", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47474", }, { cve: "CVE-2021-47475", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47475", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: vmk80xx: fix transfer-buffer overflows\n\nThe driver uses endpoint-sized USB transfer buffers but up until\nrecently had no sanity checks on the sizes.\n\nCommit e1f13c879a7c (\"staging: comedi: check validity of wMaxPacketSize\nof usb endpoints found\") inadvertently fixed NULL-pointer dereferences\nwhen accessing the transfer buffers in case a malicious device has a\nzero wMaxPacketSize.\n\nMake sure to allocate buffers large enough to handle also the other\naccesses that are done without a size check (e.g. byte 18 in\nvmk80xx_cnt_insn_read() for the VMK8061_MODEL) to avoid writing beyond\nthe buffers, for example, when doing descriptor fuzzing.\n\nThe original driver was for a low-speed device with 8-byte buffers.\nSupport was later added for a device that uses bulk transfers and is\npresumably a full-speed device with a maximum 64-byte wMaxPacketSize.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47475", url: "https://www.suse.com/security/cve/CVE-2021-47475", }, { category: "external", summary: "SUSE Bug 1224914 for CVE-2021-47475", url: "https://bugzilla.suse.com/1224914", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47475", }, { cve: "CVE-2021-47476", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47476", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: ni_usb6501: fix NULL-deref in command paths\n\nThe driver uses endpoint-sized USB transfer buffers but had no sanity\nchecks on the sizes. This can lead to zero-size-pointer dereferences or\noverflowed transfer buffers in ni6501_port_command() and\nni6501_counter_command() if a (malicious) device has smaller max-packet\nsizes than expected (or when doing descriptor fuzz testing).\n\nAdd the missing sanity checks to probe().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47476", url: "https://www.suse.com/security/cve/CVE-2021-47476", }, { category: "external", summary: "SUSE Bug 1224913 for CVE-2021-47476", url: "https://bugzilla.suse.com/1224913", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47476", }, { cve: "CVE-2021-47477", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47477", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: dt9812: fix DMA buffers on stack\n\nUSB transfer buffers are typically mapped for DMA and must not be\nallocated on the stack or transfers will fail.\n\nAllocate proper transfer buffers in the various command helpers and\nreturn an error on short transfers instead of acting on random stack\ndata.\n\nNote that this also fixes a stack info leak on systems where DMA is not\nused as 32 bytes are always sent to the device regardless of how short\nthe command is.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47477", url: "https://www.suse.com/security/cve/CVE-2021-47477", }, { category: "external", summary: "SUSE Bug 1224912 for CVE-2021-47477", url: "https://bugzilla.suse.com/1224912", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47477", }, { cve: "CVE-2021-47478", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47478", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nisofs: Fix out of bound access for corrupted isofs image\n\nWhen isofs image is suitably corrupted isofs_read_inode() can read data\nbeyond the end of buffer. Sanity-check the directory entry length before\nusing it.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47478", url: "https://www.suse.com/security/cve/CVE-2021-47478", }, { category: "external", summary: "SUSE Bug 1225198 for CVE-2021-47478", url: "https://bugzilla.suse.com/1225198", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47478", }, { cve: "CVE-2021-47479", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47479", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8712: fix use-after-free in rtl8712_dl_fw\n\nSyzbot reported use-after-free in rtl8712_dl_fw(). The problem was in\nrace condition between r871xu_dev_remove() ->ndo_open() callback.\n\nIt's easy to see from crash log, that driver accesses released firmware\nin ->ndo_open() callback. It may happen, since driver was releasing\nfirmware _before_ unregistering netdev. Fix it by moving\nunregister_netdev() before cleaning up resources.\n\nCall Trace:\n...\n rtl871x_open_fw drivers/staging/rtl8712/hal_init.c:83 [inline]\n rtl8712_dl_fw+0xd95/0xe10 drivers/staging/rtl8712/hal_init.c:170\n rtl8712_hal_init drivers/staging/rtl8712/hal_init.c:330 [inline]\n rtl871x_hal_init+0xae/0x180 drivers/staging/rtl8712/hal_init.c:394\n netdev_open+0xe6/0x6c0 drivers/staging/rtl8712/os_intfs.c:380\n __dev_open+0x2bc/0x4d0 net/core/dev.c:1484\n\nFreed by task 1306:\n...\n release_firmware+0x1b/0x30 drivers/base/firmware_loader/main.c:1053\n r871xu_dev_remove+0xcc/0x2c0 drivers/staging/rtl8712/usb_intf.c:599\n usb_unbind_interface+0x1d8/0x8d0 drivers/usb/core/driver.c:458", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47479", url: "https://www.suse.com/security/cve/CVE-2021-47479", }, { category: "external", summary: "SUSE Bug 1224911 for CVE-2021-47479", url: "https://bugzilla.suse.com/1224911", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47479", }, { cve: "CVE-2021-47480", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47480", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Put LLD module refcnt after SCSI device is released\n\nSCSI host release is triggered when SCSI device is freed. We have to make\nsure that the low-level device driver module won't be unloaded before SCSI\nhost instance is released because shost->hostt is required in the release\nhandler.\n\nMake sure to put LLD module refcnt after SCSI device is released.\n\nFixes a kernel panic of 'BUG: unable to handle page fault for address'\nreported by Changhui and Yi.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47480", url: "https://www.suse.com/security/cve/CVE-2021-47480", }, { category: "external", summary: "SUSE Bug 1225322 for CVE-2021-47480", url: "https://bugzilla.suse.com/1225322", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47480", }, { cve: "CVE-2021-47481", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47481", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mlx5: Initialize the ODP xarray when creating an ODP MR\n\nNormally the zero fill would hide the missing initialization, but an\nerrant set to desc_size in reg_create() causes a crash:\n\n BUG: unable to handle page fault for address: 0000000800000000\n PGD 0 P4D 0\n Oops: 0000 [#1] SMP PTI\n CPU: 5 PID: 890 Comm: ib_write_bw Not tainted 5.15.0-rc4+ #47\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:mlx5_ib_dereg_mr+0x14/0x3b0 [mlx5_ib]\n Code: 48 63 cd 4c 89 f7 48 89 0c 24 e8 37 30 03 e1 48 8b 0c 24 eb a0 90 0f 1f 44 00 00 41 56 41 55 41 54 55 53 48 89 fb 48 83 ec 30 <48> 8b 2f 65 48 8b 04 25 28 00 00 00 48 89 44 24 28 31 c0 8b 87 c8\n RSP: 0018:ffff88811afa3a60 EFLAGS: 00010286\n RAX: 000000000000001c RBX: 0000000800000000 RCX: 0000000000000000\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000800000000\n RBP: 0000000800000000 R08: 0000000000000000 R09: c0000000fffff7ff\n R10: ffff88811afa38f8 R11: ffff88811afa38f0 R12: ffffffffa02c7ac0\n R13: 0000000000000000 R14: ffff88811afa3cd8 R15: ffff88810772fa00\n FS: 00007f47b9080740(0000) GS:ffff88852cd40000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000800000000 CR3: 000000010761e003 CR4: 0000000000370ea0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n mlx5_ib_free_odp_mr+0x95/0xc0 [mlx5_ib]\n mlx5_ib_dereg_mr+0x128/0x3b0 [mlx5_ib]\n ib_dereg_mr_user+0x45/0xb0 [ib_core]\n ? xas_load+0x8/0x80\n destroy_hw_idr_uobject+0x1a/0x50 [ib_uverbs]\n uverbs_destroy_uobject+0x2f/0x150 [ib_uverbs]\n uobj_destroy+0x3c/0x70 [ib_uverbs]\n ib_uverbs_cmd_verbs+0x467/0xb00 [ib_uverbs]\n ? uverbs_finalize_object+0x60/0x60 [ib_uverbs]\n ? ttwu_queue_wakelist+0xa9/0xe0\n ? pty_write+0x85/0x90\n ? file_tty_write.isra.33+0x214/0x330\n ? process_echoes+0x60/0x60\n ib_uverbs_ioctl+0xa7/0x110 [ib_uverbs]\n __x64_sys_ioctl+0x10d/0x8e0\n ? vfs_write+0x17f/0x260\n do_syscall_64+0x3c/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nAdd the missing xarray initialization and remove the desc_size set.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47481", url: "https://www.suse.com/security/cve/CVE-2021-47481", }, { category: "external", summary: "SUSE Bug 1224910 for CVE-2021-47481", url: "https://bugzilla.suse.com/1224910", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47481", }, { cve: "CVE-2021-47482", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47482", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: batman-adv: fix error handling\n\nSyzbot reported ODEBUG warning in batadv_nc_mesh_free(). The problem was\nin wrong error handling in batadv_mesh_init().\n\nBefore this patch batadv_mesh_init() was calling batadv_mesh_free() in case\nof any batadv_*_init() calls failure. This approach may work well, when\nthere is some kind of indicator, which can tell which parts of batadv are\ninitialized; but there isn't any.\n\nAll written above lead to cleaning up uninitialized fields. Even if we hide\nODEBUG warning by initializing bat_priv->nc.work, syzbot was able to hit\nGPF in batadv_nc_purge_paths(), because hash pointer in still NULL. [1]\n\nTo fix these bugs we can unwind batadv_*_init() calls one by one.\nIt is good approach for 2 reasons: 1) It fixes bugs on error handling\npath 2) It improves the performance, since we won't call unneeded\nbatadv_*_free() functions.\n\nSo, this patch makes all batadv_*_init() clean up all allocated memory\nbefore returning with an error to no call correspoing batadv_*_free()\nand open-codes batadv_mesh_free() with proper order to avoid touching\nuninitialized fields.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47482", url: "https://www.suse.com/security/cve/CVE-2021-47482", }, { category: "external", summary: "SUSE Bug 1224909 for CVE-2021-47482", url: "https://bugzilla.suse.com/1224909", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47482", }, { cve: "CVE-2021-47483", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47483", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nregmap: Fix possible double-free in regcache_rbtree_exit()\n\nIn regcache_rbtree_insert_to_block(), when 'present' realloc failed,\nthe 'blk' which is supposed to assign to 'rbnode->block' will be freed,\nso 'rbnode->block' points a freed memory, in the error handling path of\nregcache_rbtree_init(), 'rbnode->block' will be freed again in\nregcache_rbtree_exit(), KASAN will report double-free as follows:\n\nBUG: KASAN: double-free or invalid-free in kfree+0xce/0x390\nCall Trace:\n slab_free_freelist_hook+0x10d/0x240\n kfree+0xce/0x390\n regcache_rbtree_exit+0x15d/0x1a0\n regcache_rbtree_init+0x224/0x2c0\n regcache_init+0x88d/0x1310\n __regmap_init+0x3151/0x4a80\n __devm_regmap_init+0x7d/0x100\n madera_spi_probe+0x10f/0x333 [madera_spi]\n spi_probe+0x183/0x210\n really_probe+0x285/0xc30\n\nTo fix this, moving up the assignment of rbnode->block to immediately after\nthe reallocation has succeeded so that the data structure stays valid even\nif the second reallocation fails.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47483", url: "https://www.suse.com/security/cve/CVE-2021-47483", }, { category: "external", summary: "SUSE Bug 1224907 for CVE-2021-47483", url: "https://bugzilla.suse.com/1224907", }, { category: "external", summary: "SUSE Bug 1224908 for CVE-2021-47483", url: "https://bugzilla.suse.com/1224908", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47483", }, { cve: "CVE-2021-47484", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47484", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-af: Fix possible null pointer dereference.\n\nThis patch fixes possible null pointer dereference in files\n\"rvu_debugfs.c\" and \"rvu_nix.c\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47484", url: "https://www.suse.com/security/cve/CVE-2021-47484", }, { category: "external", summary: "SUSE Bug 1224905 for CVE-2021-47484", url: "https://bugzilla.suse.com/1224905", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47484", }, { cve: "CVE-2021-47485", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47485", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields\n\nOverflowing either addrlimit or bytes_togo can allow userspace to trigger\na buffer overflow of kernel memory. Check for overflows in all the places\ndoing math on user controlled buffers.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47485", url: "https://www.suse.com/security/cve/CVE-2021-47485", }, { category: "external", summary: "SUSE Bug 1224904 for CVE-2021-47485", url: "https://bugzilla.suse.com/1224904", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47485", }, { cve: "CVE-2021-47486", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47486", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv, bpf: Fix potential NULL dereference\n\nThe bpf_jit_binary_free() function requires a non-NULL argument. When\nthe RISC-V BPF JIT fails to converge in NR_JIT_ITERATIONS steps,\njit_data->header will be NULL, which triggers a NULL\ndereference. Avoid this by checking the argument, prior calling the\nfunction.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47486", url: "https://www.suse.com/security/cve/CVE-2021-47486", }, { category: "external", summary: "SUSE Bug 1224903 for CVE-2021-47486", url: "https://bugzilla.suse.com/1224903", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47486", }, { cve: "CVE-2021-47488", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47488", }, ], notes: [ { category: "general", text: "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47488", url: "https://www.suse.com/security/cve/CVE-2021-47488", }, { category: "external", summary: "SUSE Bug 1224902 for CVE-2021-47488", url: "https://bugzilla.suse.com/1224902", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47488", }, { cve: "CVE-2021-47489", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47489", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix even more out of bound writes from debugfs\n\nCVE-2021-42327 was fixed by:\n\ncommit f23750b5b3d98653b31d4469592935ef6364ad67\nAuthor: Thelford Williams <tdwilliamsiv@gmail.com>\nDate: Wed Oct 13 16:04:13 2021 -0400\n\n drm/amdgpu: fix out of bounds write\n\nbut amdgpu_dm_debugfs.c contains more of the same issue so fix the\nremaining ones.\n\nv2:\n\t* Add missing fix in dp_max_bpc_write (Harry Wentland)", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47489", url: "https://www.suse.com/security/cve/CVE-2021-47489", }, { category: "external", summary: "SUSE Bug 1224901 for CVE-2021-47489", url: "https://bugzilla.suse.com/1224901", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47489", }, { cve: "CVE-2021-47490", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47490", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/ttm: fix memleak in ttm_transfered_destroy\n\nWe need to cleanup the fences for ghost objects as well.\n\nBug: https://bugzilla.kernel.org/show_bug.cgi?id=214029\nBug: https://bugzilla.kernel.org/show_bug.cgi?id=214447", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47490", url: "https://www.suse.com/security/cve/CVE-2021-47490", }, { category: "external", summary: "SUSE Bug 1225436 for CVE-2021-47490", url: "https://bugzilla.suse.com/1225436", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47490", }, { cve: "CVE-2021-47491", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47491", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: khugepaged: skip huge page collapse for special files\n\nThe read-only THP for filesystems will collapse THP for files opened\nreadonly and mapped with VM_EXEC. The intended usecase is to avoid TLB\nmisses for large text segments. But it doesn't restrict the file types\nso a THP could be collapsed for a non-regular file, for example, block\ndevice, if it is opened readonly and mapped with EXEC permission. This\nmay cause bugs, like [1] and [2].\n\nThis is definitely not the intended usecase, so just collapse THP for\nregular files in order to close the attack surface.\n\n[shy828301@gmail.com: fix vm_file check [3]]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47491", url: "https://www.suse.com/security/cve/CVE-2021-47491", }, { category: "external", summary: "SUSE Bug 1224900 for CVE-2021-47491", url: "https://bugzilla.suse.com/1224900", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47491", }, { cve: "CVE-2021-47492", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47492", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmm, thp: bail out early in collapse_file for writeback page\n\nCurrently collapse_file does not explicitly check PG_writeback, instead,\npage_has_private and try_to_release_page are used to filter writeback\npages. This does not work for xfs with blocksize equal to or larger\nthan pagesize, because in such case xfs has no page->private.\n\nThis makes collapse_file bail out early for writeback page. Otherwise,\nxfs end_page_writeback will panic as follows.\n\n page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:ffff0003f88c86a8 index:0x0 pfn:0x84ef32\n aops:xfs_address_space_operations [xfs] ino:30000b7 dentry name:\"libtest.so\"\n flags: 0x57fffe0000008027(locked|referenced|uptodate|active|writeback)\n raw: 57fffe0000008027 ffff80001b48bc28 ffff80001b48bc28 ffff0003f88c86a8\n raw: 0000000000000000 0000000000000000 00000000ffffffff ffff0000c3e9a000\n page dumped because: VM_BUG_ON_PAGE(((unsigned int) page_ref_count(page) + 127u <= 127u))\n page->mem_cgroup:ffff0000c3e9a000\n ------------[ cut here ]------------\n kernel BUG at include/linux/mm.h:1212!\n Internal error: Oops - BUG: 0 [#1] SMP\n Modules linked in:\n BUG: Bad page state in process khugepaged pfn:84ef32\n xfs(E)\n page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:0 index:0x0 pfn:0x84ef32\n libcrc32c(E) rfkill(E) aes_ce_blk(E) crypto_simd(E) ...\n CPU: 25 PID: 0 Comm: swapper/25 Kdump: loaded Tainted: ...\n pstate: 60400005 (nZCv daif +PAN -UAO -TCO BTYPE=--)\n Call trace:\n end_page_writeback+0x1c0/0x214\n iomap_finish_page_writeback+0x13c/0x204\n iomap_finish_ioend+0xe8/0x19c\n iomap_writepage_end_bio+0x38/0x50\n bio_endio+0x168/0x1ec\n blk_update_request+0x278/0x3f0\n blk_mq_end_request+0x34/0x15c\n virtblk_request_done+0x38/0x74 [virtio_blk]\n blk_done_softirq+0xc4/0x110\n __do_softirq+0x128/0x38c\n __irq_exit_rcu+0x118/0x150\n irq_exit+0x1c/0x30\n __handle_domain_irq+0x8c/0xf0\n gic_handle_irq+0x84/0x108\n el1_irq+0xcc/0x180\n arch_cpu_idle+0x18/0x40\n default_idle_call+0x4c/0x1a0\n cpuidle_idle_call+0x168/0x1e0\n do_idle+0xb4/0x104\n cpu_startup_entry+0x30/0x9c\n secondary_start_kernel+0x104/0x180\n Code: d4210000 b0006161 910c8021 94013f4d (d4210000)\n ---[ end trace 4a88c6a074082f8c ]---\n Kernel panic - not syncing: Oops - BUG: Fatal exception in interrupt", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47492", url: "https://www.suse.com/security/cve/CVE-2021-47492", }, { category: "external", summary: "SUSE Bug 1224898 for CVE-2021-47492", url: "https://bugzilla.suse.com/1224898", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47492", }, { cve: "CVE-2021-47493", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47493", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix race between searching chunks and release journal_head from buffer_head\n\nEncountered a race between ocfs2_test_bg_bit_allocatable() and\njbd2_journal_put_journal_head() resulting in the below vmcore.\n\n PID: 106879 TASK: ffff880244ba9c00 CPU: 2 COMMAND: \"loop3\"\n Call trace:\n panic\n oops_end\n no_context\n __bad_area_nosemaphore\n bad_area_nosemaphore\n __do_page_fault\n do_page_fault\n page_fault\n [exception RIP: ocfs2_block_group_find_clear_bits+316]\n ocfs2_block_group_find_clear_bits [ocfs2]\n ocfs2_cluster_group_search [ocfs2]\n ocfs2_search_chain [ocfs2]\n ocfs2_claim_suballoc_bits [ocfs2]\n __ocfs2_claim_clusters [ocfs2]\n ocfs2_claim_clusters [ocfs2]\n ocfs2_local_alloc_slide_window [ocfs2]\n ocfs2_reserve_local_alloc_bits [ocfs2]\n ocfs2_reserve_clusters_with_limit [ocfs2]\n ocfs2_reserve_clusters [ocfs2]\n ocfs2_lock_refcount_allocators [ocfs2]\n ocfs2_make_clusters_writable [ocfs2]\n ocfs2_replace_cow [ocfs2]\n ocfs2_refcount_cow [ocfs2]\n ocfs2_file_write_iter [ocfs2]\n lo_rw_aio\n loop_queue_work\n kthread_worker_fn\n kthread\n ret_from_fork\n\nWhen ocfs2_test_bg_bit_allocatable() called bh2jh(bg_bh), the\nbg_bh->b_private NULL as jbd2_journal_put_journal_head() raced and\nreleased the jounal head from the buffer head. Needed to take bit lock\nfor the bit 'BH_JournalHead' to fix this race.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47493", url: "https://www.suse.com/security/cve/CVE-2021-47493", }, { category: "external", summary: "SUSE Bug 1225439 for CVE-2021-47493", url: "https://bugzilla.suse.com/1225439", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47493", }, { cve: "CVE-2021-47494", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47494", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncfg80211: fix management registrations locking\n\nThe management registrations locking was broken, the list was\nlocked for each wdev, but cfg80211_mgmt_registrations_update()\niterated it without holding all the correct spinlocks, causing\nlist corruption.\n\nRather than trying to fix it with fine-grained locking, just\nmove the lock to the wiphy/rdev (still need the list on each\nwdev), we already need to hold the wdev lock to change it, so\nthere's no contention on the lock in any case. This trivially\nfixes the bug since we hold one wdev's lock already, and now\nwill hold the lock that protects all lists.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47494", url: "https://www.suse.com/security/cve/CVE-2021-47494", }, { category: "external", summary: "SUSE Bug 1225450 for CVE-2021-47494", url: "https://bugzilla.suse.com/1225450", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47494", }, { cve: "CVE-2021-47495", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47495", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: sanity check for maxpacket\n\nmaxpacket of 0 makes no sense and oopses as we need to divide\nby it. Give up.\n\nV2: fixed typo in log and stylistic issues", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47495", url: "https://www.suse.com/security/cve/CVE-2021-47495", }, { category: "external", summary: "SUSE Bug 1225351 for CVE-2021-47495", url: "https://bugzilla.suse.com/1225351", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47495", }, { cve: "CVE-2021-47496", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47496", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/tls: Fix flipped sign in tls_err_abort() calls\n\nsk->sk_err appears to expect a positive value, a convention that ktls\ndoesn't always follow and that leads to memory corruption in other code.\nFor instance,\n\n [kworker]\n tls_encrypt_done(..., err=<negative error from crypto request>)\n tls_err_abort(.., err)\n sk->sk_err = err;\n\n [task]\n splice_from_pipe_feed\n ...\n tls_sw_do_sendpage\n if (sk->sk_err) {\n ret = -sk->sk_err; // ret is positive\n\n splice_from_pipe_feed (continued)\n ret = actor(...) // ret is still positive and interpreted as bytes\n // written, resulting in underflow of buf->len and\n // sd->len, leading to huge buf->offset and bogus\n // addresses computed in later calls to actor()\n\nFix all tls_err_abort() callers to pass a negative error code\nconsistently and centralize the error-prone sign flip there, throwing in\na warning to catch future misuse and uninlining the function so it\nreally does only warn once.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47496", url: "https://www.suse.com/security/cve/CVE-2021-47496", }, { category: "external", summary: "SUSE Bug 1225354 for CVE-2021-47496", url: "https://bugzilla.suse.com/1225354", }, { category: "external", summary: "SUSE Bug 1227656 for CVE-2021-47496", url: "https://bugzilla.suse.com/1227656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2021-47496", }, { cve: "CVE-2021-47497", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47497", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmem: Fix shift-out-of-bound (UBSAN) with byte size cells\n\nIf a cell has 'nbits' equal to a multiple of BITS_PER_BYTE the logic\n\n *p &= GENMASK((cell->nbits%BITS_PER_BYTE) - 1, 0);\n\nwill become undefined behavior because nbits modulo BITS_PER_BYTE is 0, and we\nsubtract one from that making a large number that is then shifted more than the\nnumber of bits that fit into an unsigned long.\n\nUBSAN reports this problem:\n\n UBSAN: shift-out-of-bounds in drivers/nvmem/core.c:1386:8\n shift exponent 64 is too large for 64-bit type 'unsigned long'\n CPU: 6 PID: 7 Comm: kworker/u16:0 Not tainted 5.15.0-rc3+ #9\n Hardware name: Google Lazor (rev3+) with KB Backlight (DT)\n Workqueue: events_unbound deferred_probe_work_func\n Call trace:\n dump_backtrace+0x0/0x170\n show_stack+0x24/0x30\n dump_stack_lvl+0x64/0x7c\n dump_stack+0x18/0x38\n ubsan_epilogue+0x10/0x54\n __ubsan_handle_shift_out_of_bounds+0x180/0x194\n __nvmem_cell_read+0x1ec/0x21c\n nvmem_cell_read+0x58/0x94\n nvmem_cell_read_variable_common+0x4c/0xb0\n nvmem_cell_read_variable_le_u32+0x40/0x100\n a6xx_gpu_init+0x170/0x2f4\n adreno_bind+0x174/0x284\n component_bind_all+0xf0/0x264\n msm_drm_bind+0x1d8/0x7a0\n try_to_bring_up_master+0x164/0x1ac\n __component_add+0xbc/0x13c\n component_add+0x20/0x2c\n dp_display_probe+0x340/0x384\n platform_probe+0xc0/0x100\n really_probe+0x110/0x304\n __driver_probe_device+0xb8/0x120\n driver_probe_device+0x4c/0xfc\n __device_attach_driver+0xb0/0x128\n bus_for_each_drv+0x90/0xdc\n __device_attach+0xc8/0x174\n device_initial_probe+0x20/0x2c\n bus_probe_device+0x40/0xa4\n deferred_probe_work_func+0x7c/0xb8\n process_one_work+0x128/0x21c\n process_scheduled_works+0x40/0x54\n worker_thread+0x1ec/0x2a8\n kthread+0x138/0x158\n ret_from_fork+0x10/0x20\n\nFix it by making sure there are any bits to mask out.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47497", url: "https://www.suse.com/security/cve/CVE-2021-47497", }, { category: "external", summary: "SUSE Bug 1225355 for CVE-2021-47497", url: "https://bugzilla.suse.com/1225355", }, { category: "external", summary: "SUSE Bug 1227655 for CVE-2021-47497", url: "https://bugzilla.suse.com/1227655", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 0, baseSeverity: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47497", }, { cve: "CVE-2021-47498", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47498", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndm rq: don't queue request to blk-mq during DM suspend\n\nDM uses blk-mq's quiesce/unquiesce to stop/start device mapper queue.\n\nBut blk-mq's unquiesce may come from outside events, such as elevator\nswitch, updating nr_requests or others, and request may come during\nsuspend, so simply ask for blk-mq to requeue it.\n\nFixes one kernel panic issue when running updating nr_requests and\ndm-mpath suspend/resume stress test.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47498", url: "https://www.suse.com/security/cve/CVE-2021-47498", }, { category: "external", summary: "SUSE Bug 1225357 for CVE-2021-47498", url: "https://bugzilla.suse.com/1225357", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47498", }, { cve: "CVE-2021-47499", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47499", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\niio: accel: kxcjk-1013: Fix possible memory leak in probe and remove\n\nWhen ACPI type is ACPI_SMO8500, the data->dready_trig will not be set, the\nmemory allocated by iio_triggered_buffer_setup() will not be freed, and cause\nmemory leak as follows:\n\nunreferenced object 0xffff888009551400 (size 512):\n comm \"i2c-SMO8500-125\", pid 911, jiffies 4294911787 (age 83.852s)\n hex dump (first 32 bytes):\n 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 20 e2 e5 c0 ff ff ff ff ........ .......\n backtrace:\n [<0000000041ce75ee>] kmem_cache_alloc_trace+0x16d/0x360\n [<000000000aeb17b0>] iio_kfifo_allocate+0x41/0x130 [kfifo_buf]\n [<000000004b40c1f5>] iio_triggered_buffer_setup_ext+0x2c/0x210 [industrialio_triggered_buffer]\n [<000000004375b15f>] kxcjk1013_probe+0x10c3/0x1d81 [kxcjk_1013]\n\nFix it by remove data->dready_trig condition in probe and remove.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47499", url: "https://www.suse.com/security/cve/CVE-2021-47499", }, { category: "external", summary: "SUSE Bug 1225358 for CVE-2021-47499", url: "https://bugzilla.suse.com/1225358", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47499", }, { cve: "CVE-2021-47500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47500", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\niio: mma8452: Fix trigger reference couting\n\nThe mma8452 driver directly assigns a trigger to the struct iio_dev. The\nIIO core when done using this trigger will call `iio_trigger_put()` to drop\nthe reference count by 1.\n\nWithout the matching `iio_trigger_get()` in the driver the reference count\ncan reach 0 too early, the trigger gets freed while still in use and a\nuse-after-free occurs.\n\nFix this by getting a reference to the trigger before assigning it to the\nIIO device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47500", url: "https://www.suse.com/security/cve/CVE-2021-47500", }, { category: "external", summary: "SUSE Bug 1225360 for CVE-2021-47500", url: "https://bugzilla.suse.com/1225360", }, { category: "external", summary: "SUSE Bug 1227698 for CVE-2021-47500", url: "https://bugzilla.suse.com/1227698", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2021-47500", }, { cve: "CVE-2021-47501", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47501", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix NULL pointer dereference in i40e_dbg_dump_desc\n\nWhen trying to dump VFs VSI RX/TX descriptors\nusing debugfs there was a crash\ndue to NULL pointer dereference in i40e_dbg_dump_desc.\nAdded a check to i40e_dbg_dump_desc that checks if\nVSI type is correct for dumping RX/TX descriptors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47501", url: "https://www.suse.com/security/cve/CVE-2021-47501", }, { category: "external", summary: "SUSE Bug 1225361 for CVE-2021-47501", url: "https://bugzilla.suse.com/1225361", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47501", }, { cve: "CVE-2021-47502", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47502", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: codecs: wcd934x: handle channel mappping list correctly\n\nCurrently each channel is added as list to dai channel list, however\nthere is danger of adding same channel to multiple dai channel list\nwhich endups corrupting the other list where its already added.\n\nThis patch ensures that the channel is actually free before adding to\nthe dai channel list and also ensures that the channel is on the list\nbefore deleting it.\n\nThis check was missing previously, and we did not hit this issue as\nwe were testing very simple usecases with sequence of amixer commands.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47502", url: "https://www.suse.com/security/cve/CVE-2021-47502", }, { category: "external", summary: "SUSE Bug 1225369 for CVE-2021-47502", url: "https://bugzilla.suse.com/1225369", }, { category: "external", summary: "SUSE Bug 1227699 for CVE-2021-47502", url: "https://bugzilla.suse.com/1227699", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2021-47502", }, { cve: "CVE-2021-47503", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47503", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Do not call scsi_remove_host() in pm8001_alloc()\n\nCalling scsi_remove_host() before scsi_add_host() results in a crash:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000108\n RIP: 0010:device_del+0x63/0x440\n Call Trace:\n device_unregister+0x17/0x60\n scsi_remove_host+0xee/0x2a0\n pm8001_pci_probe+0x6ef/0x1b90 [pm80xx]\n local_pci_probe+0x3f/0x90\n\nWe cannot call scsi_remove_host() in pm8001_alloc() because scsi_add_host()\nhas not been called yet at that point in time.\n\nFunction call tree:\n\n pm8001_pci_probe()\n |\n `- pm8001_pci_alloc()\n | |\n | `- pm8001_alloc()\n | |\n | `- scsi_remove_host()\n |\n `- scsi_add_host()", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47503", url: "https://www.suse.com/security/cve/CVE-2021-47503", }, { category: "external", summary: "SUSE Bug 1225374 for CVE-2021-47503", url: "https://bugzilla.suse.com/1225374", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47503", }, { cve: "CVE-2021-47504", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47504", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: ensure task_work gets run as part of cancelations\n\nIf we successfully cancel a work item but that work item needs to be\nprocessed through task_work, then we can be sleeping uninterruptibly\nin io_uring_cancel_generic() and never process it. Hence we don't\nmake forward progress and we end up with an uninterruptible sleep\nwarning.\n\nWhile in there, correct a comment that should be IFF, not IIF.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47504", url: "https://www.suse.com/security/cve/CVE-2021-47504", }, { category: "external", summary: "SUSE Bug 1225382 for CVE-2021-47504", url: "https://bugzilla.suse.com/1225382", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47504", }, { cve: "CVE-2021-47505", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47505", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\naio: fix use-after-free due to missing POLLFREE handling\n\nsignalfd_poll() and binder_poll() are special in that they use a\nwaitqueue whose lifetime is the current task, rather than the struct\nfile as is normally the case. This is okay for blocking polls, since a\nblocking poll occurs within one task; however, non-blocking polls\nrequire another solution. This solution is for the queue to be cleared\nbefore it is freed, by sending a POLLFREE notification to all waiters.\n\nUnfortunately, only eventpoll handles POLLFREE. A second type of\nnon-blocking poll, aio poll, was added in kernel v4.18, and it doesn't\nhandle POLLFREE. This allows a use-after-free to occur if a signalfd or\nbinder fd is polled with aio poll, and the waitqueue gets freed.\n\nFix this by making aio poll handle POLLFREE.\n\nA patch by Ramji Jiyani <ramjiyani@google.com>\n(https://lore.kernel.org/r/20211027011834.2497484-1-ramjiyani@google.com)\ntried to do this by making aio_poll_wake() always complete the request\ninline if POLLFREE is seen. However, that solution had two bugs.\nFirst, it introduced a deadlock, as it unconditionally locked the aio\ncontext while holding the waitqueue lock, which inverts the normal\nlocking order. Second, it didn't consider that POLLFREE notifications\nare missed while the request has been temporarily de-queued.\n\nThe second problem was solved by my previous patch. This patch then\nproperly fixes the use-after-free by handling POLLFREE in a\ndeadlock-free way. It does this by taking advantage of the fact that\nfreeing of the waitqueue is RCU-delayed, similar to what eventpoll does.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47505", url: "https://www.suse.com/security/cve/CVE-2021-47505", }, { category: "external", summary: "SUSE Bug 1225400 for CVE-2021-47505", url: "https://bugzilla.suse.com/1225400", }, { category: "external", summary: "SUSE Bug 1227652 for CVE-2021-47505", url: "https://bugzilla.suse.com/1227652", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2021-47505", }, { cve: "CVE-2021-47506", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47506", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: fix use-after-free due to delegation race\n\nA delegation break could arrive as soon as we've called vfs_setlease. A\ndelegation break runs a callback which immediately (in\nnfsd4_cb_recall_prepare) adds the delegation to del_recall_lru. If we\nthen exit nfs4_set_delegation without hashing the delegation, it will be\nfreed as soon as the callback is done with it, without ever being\nremoved from del_recall_lru.\n\nSymptoms show up later as use-after-free or list corruption warnings,\nusually in the laundromat thread.\n\nI suspect aba2072f4523 \"nfsd: grant read delegations to clients holding\nwrites\" made this bug easier to hit, but I looked as far back as v3.0\nand it looks to me it already had the same problem. So I'm not sure\nwhere the bug was introduced; it may have been there from the beginning.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47506", url: "https://www.suse.com/security/cve/CVE-2021-47506", }, { category: "external", summary: "SUSE Bug 1225404 for CVE-2021-47506", url: "https://bugzilla.suse.com/1225404", }, { category: "external", summary: "SUSE Bug 1227497 for CVE-2021-47506", url: "https://bugzilla.suse.com/1227497", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47506", }, { cve: "CVE-2021-47507", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47507", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: Fix nsfd startup race (again)\n\nCommit bd5ae9288d64 (\"nfsd: register pernet ops last, unregister first\")\nhas re-opened rpc_pipefs_event() race against nfsd_net_id registration\n(register_pernet_subsys()) which has been fixed by commit bb7ffbf29e76\n(\"nfsd: fix nsfd startup race triggering BUG_ON\").\n\nRestore the order of register_pernet_subsys() vs register_cld_notifier().\nAdd WARN_ON() to prevent a future regression.\n\nCrash info:\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000012\nCPU: 8 PID: 345 Comm: mount Not tainted 5.4.144-... #1\npc : rpc_pipefs_event+0x54/0x120 [nfsd]\nlr : rpc_pipefs_event+0x48/0x120 [nfsd]\nCall trace:\n rpc_pipefs_event+0x54/0x120 [nfsd]\n blocking_notifier_call_chain\n rpc_fill_super\n get_tree_keyed\n rpc_fs_get_tree\n vfs_get_tree\n do_mount\n ksys_mount\n __arm64_sys_mount\n el0_svc_handler\n el0_svc", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47507", url: "https://www.suse.com/security/cve/CVE-2021-47507", }, { category: "external", summary: "SUSE Bug 1225405 for CVE-2021-47507", url: "https://bugzilla.suse.com/1225405", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47507", }, { cve: "CVE-2021-47508", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47508", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: free exchange changeset on failures\n\nFstests runs on my VMs have show several kmemleak reports like the following.\n\n unreferenced object 0xffff88811ae59080 (size 64):\n comm \"xfs_io\", pid 12124, jiffies 4294987392 (age 6.368s)\n hex dump (first 32 bytes):\n 00 c0 1c 00 00 00 00 00 ff cf 1c 00 00 00 00 00 ................\n 90 97 e5 1a 81 88 ff ff 90 97 e5 1a 81 88 ff ff ................\n backtrace:\n [<00000000ac0176d2>] ulist_add_merge+0x60/0x150 [btrfs]\n [<0000000076e9f312>] set_state_bits+0x86/0xc0 [btrfs]\n [<0000000014fe73d6>] set_extent_bit+0x270/0x690 [btrfs]\n [<000000004f675208>] set_record_extent_bits+0x19/0x20 [btrfs]\n [<00000000b96137b1>] qgroup_reserve_data+0x274/0x310 [btrfs]\n [<0000000057e9dcbb>] btrfs_check_data_free_space+0x5c/0xa0 [btrfs]\n [<0000000019c4511d>] btrfs_delalloc_reserve_space+0x1b/0xa0 [btrfs]\n [<000000006d37e007>] btrfs_dio_iomap_begin+0x415/0x970 [btrfs]\n [<00000000fb8a74b8>] iomap_iter+0x161/0x1e0\n [<0000000071dff6ff>] __iomap_dio_rw+0x1df/0x700\n [<000000002567ba53>] iomap_dio_rw+0x5/0x20\n [<0000000072e555f8>] btrfs_file_write_iter+0x290/0x530 [btrfs]\n [<000000005eb3d845>] new_sync_write+0x106/0x180\n [<000000003fb505bf>] vfs_write+0x24d/0x2f0\n [<000000009bb57d37>] __x64_sys_pwrite64+0x69/0xa0\n [<000000003eba3fdf>] do_syscall_64+0x43/0x90\n\nIn case brtfs_qgroup_reserve_data() or btrfs_delalloc_reserve_metadata()\nfail the allocated extent_changeset will not be freed.\n\nSo in btrfs_check_data_free_space() and btrfs_delalloc_reserve_space()\nfree the allocated extent_changeset to get rid of the allocated memory.\n\nThe issue currently only happens in the direct IO write path, but only\nafter 65b3c08606e5 (\"btrfs: fix ENOSPC failure when attempting direct IO\nwrite into NOCOW range\"), and also at defrag_one_locked_target(). Every\nother place is always calling extent_changeset_free() even if its call\nto btrfs_delalloc_reserve_space() or btrfs_check_data_free_space() has\nfailed.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47508", url: "https://www.suse.com/security/cve/CVE-2021-47508", }, { category: "external", summary: "SUSE Bug 1225408 for CVE-2021-47508", url: "https://bugzilla.suse.com/1225408", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47508", }, { cve: "CVE-2021-47509", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47509", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: oss: Limit the period size to 16MB\n\nSet the practical limit to the period size (the fragment shift in OSS)\ninstead of a full 31bit; a too large value could lead to the exhaust\nof memory as we allocate temporary buffers of the period size, too.\n\nAs of this patch, we set to 16MB limit, which should cover all use\ncases.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47509", url: "https://www.suse.com/security/cve/CVE-2021-47509", }, { category: "external", summary: "SUSE Bug 1225409 for CVE-2021-47509", url: "https://bugzilla.suse.com/1225409", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47509", }, { cve: "CVE-2021-47510", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47510", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix re-dirty process of tree-log nodes\n\nThere is a report of a transaction abort of -EAGAIN with the following\nscript.\n\n #!/bin/sh\n\n for d in sda sdb; do\n mkfs.btrfs -d single -m single -f /dev/\\${d}\n done\n\n mount /dev/sda /mnt/test\n mount /dev/sdb /mnt/scratch\n\n for dir in test scratch; do\n echo 3 >/proc/sys/vm/drop_caches\n fio --directory=/mnt/\\${dir} --name=fio.\\${dir} --rw=read --size=50G --bs=64m \\\n --numjobs=$(nproc) --time_based --ramp_time=5 --runtime=480 \\\n --group_reporting |& tee /dev/shm/fio.\\${dir}\n echo 3 >/proc/sys/vm/drop_caches\n done\n\n for d in sda sdb; do\n umount /dev/\\${d}\n done\n\nThe stack trace is shown in below.\n\n [3310.967991] BTRFS: error (device sda) in btrfs_commit_transaction:2341: errno=-11 unknown (Error while writing out transaction)\n [3310.968060] BTRFS info (device sda): forced readonly\n [3310.968064] BTRFS warning (device sda): Skipping commit of aborted transaction.\n [3310.968065] ------------[ cut here ]------------\n [3310.968066] BTRFS: Transaction aborted (error -11)\n [3310.968074] WARNING: CPU: 14 PID: 1684 at fs/btrfs/transaction.c:1946 btrfs_commit_transaction.cold+0x209/0x2c8\n [3310.968131] CPU: 14 PID: 1684 Comm: fio Not tainted 5.14.10-300.fc35.x86_64 #1\n [3310.968135] Hardware name: DIAWAY Tartu/Tartu, BIOS V2.01.B10 04/08/2021\n [3310.968137] RIP: 0010:btrfs_commit_transaction.cold+0x209/0x2c8\n [3310.968144] RSP: 0018:ffffb284ce393e10 EFLAGS: 00010282\n [3310.968147] RAX: 0000000000000026 RBX: ffff973f147b0f60 RCX: 0000000000000027\n [3310.968149] RDX: ffff974ecf098a08 RSI: 0000000000000001 RDI: ffff974ecf098a00\n [3310.968150] RBP: ffff973f147b0f08 R08: 0000000000000000 R09: ffffb284ce393c48\n [3310.968151] R10: ffffb284ce393c40 R11: ffffffff84f47468 R12: ffff973f101bfc00\n [3310.968153] R13: ffff971f20cf2000 R14: 00000000fffffff5 R15: ffff973f147b0e58\n [3310.968154] FS: 00007efe65468740(0000) GS:ffff974ecf080000(0000) knlGS:0000000000000000\n [3310.968157] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [3310.968158] CR2: 000055691bcbe260 CR3: 000000105cfa4001 CR4: 0000000000770ee0\n [3310.968160] PKRU: 55555554\n [3310.968161] Call Trace:\n [3310.968167] ? dput+0xd4/0x300\n [3310.968174] btrfs_sync_file+0x3f1/0x490\n [3310.968180] __x64_sys_fsync+0x33/0x60\n [3310.968185] do_syscall_64+0x3b/0x90\n [3310.968190] entry_SYSCALL_64_after_hwframe+0x44/0xae\n [3310.968194] RIP: 0033:0x7efe6557329b\n [3310.968200] RSP: 002b:00007ffe0236ebc0 EFLAGS: 00000293 ORIG_RAX: 000000000000004a\n [3310.968203] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe6557329b\n [3310.968204] RDX: 0000000000000000 RSI: 00007efe58d77010 RDI: 0000000000000006\n [3310.968205] RBP: 0000000004000000 R08: 0000000000000000 R09: 00007efe58d77010\n [3310.968207] R10: 0000000016cacc0c R11: 0000000000000293 R12: 00007efe5ce95980\n [3310.968208] R13: 0000000000000000 R14: 00007efe6447c790 R15: 0000000c80000000\n [3310.968212] ---[ end trace 1a346f4d3c0d96ba ]---\n [3310.968214] BTRFS: error (device sda) in cleanup_transaction:1946: errno=-11 unknown\n\nThe abort occurs because of a write hole while writing out freeing tree\nnodes of a tree-log tree. For zoned btrfs, we re-dirty a freed tree\nnode to ensure btrfs can write the region and does not leave a hole on\nwrite on a zoned device. The current code fails to re-dirty a node\nwhen the tree-log tree's depth is greater or equal to 2. That leads to\na transaction abort with -EAGAIN.\n\nFix the issue by properly re-dirtying a node on walking up the tree.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47510", url: "https://www.suse.com/security/cve/CVE-2021-47510", }, { category: "external", summary: "SUSE Bug 1225410 for CVE-2021-47510", url: "https://bugzilla.suse.com/1225410", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47510", }, { cve: "CVE-2021-47511", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47511", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: oss: Fix negative period/buffer sizes\n\nThe period size calculation in OSS layer may receive a negative value\nas an error, but the code there assumes only the positive values and\nhandle them with size_t. Due to that, a too big value may be passed\nto the lower layers.\n\nThis patch changes the code to handle with ssize_t and adds the proper\nerror checks appropriately.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47511", url: "https://www.suse.com/security/cve/CVE-2021-47511", }, { category: "external", summary: "SUSE Bug 1225411 for CVE-2021-47511", url: "https://bugzilla.suse.com/1225411", }, { category: "external", summary: "SUSE Bug 1227700 for CVE-2021-47511", url: "https://bugzilla.suse.com/1227700", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2021-47511", }, { cve: "CVE-2021-47512", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47512", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: fq_pie: prevent dismantle issue\n\nFor some reason, fq_pie_destroy() did not copy\nworking code from pie_destroy() and other qdiscs,\nthus causing elusive bug.\n\nBefore calling del_timer_sync(&q->adapt_timer),\nwe need to ensure timer will not rearm itself.\n\nrcu: INFO: rcu_preempt self-detected stall on CPU\nrcu: 0-....: (4416 ticks this GP) idle=60d/1/0x4000000000000000 softirq=10433/10434 fqs=2579\n (t=10501 jiffies g=13085 q=3989)\nNMI backtrace for cpu 0\nCPU: 0 PID: 13 Comm: ksoftirqd/0 Not tainted 5.16.0-rc4-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nCall Trace:\n <IRQ>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\n nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:111\n nmi_trigger_cpumask_backtrace+0x1b3/0x230 lib/nmi_backtrace.c:62\n trigger_single_cpu_backtrace include/linux/nmi.h:164 [inline]\n rcu_dump_cpu_stacks+0x25e/0x3f0 kernel/rcu/tree_stall.h:343\n print_cpu_stall kernel/rcu/tree_stall.h:627 [inline]\n check_cpu_stall kernel/rcu/tree_stall.h:711 [inline]\n rcu_pending kernel/rcu/tree.c:3878 [inline]\n rcu_sched_clock_irq.cold+0x9d/0x746 kernel/rcu/tree.c:2597\n update_process_times+0x16d/0x200 kernel/time/timer.c:1785\n tick_sched_handle+0x9b/0x180 kernel/time/tick-sched.c:226\n tick_sched_timer+0x1b0/0x2d0 kernel/time/tick-sched.c:1428\n __run_hrtimer kernel/time/hrtimer.c:1685 [inline]\n __hrtimer_run_queues+0x1c0/0xe50 kernel/time/hrtimer.c:1749\n hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811\n local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1086 [inline]\n __sysvec_apic_timer_interrupt+0x146/0x530 arch/x86/kernel/apic/apic.c:1103\n sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1097\n </IRQ>\n <TASK>\n asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638\nRIP: 0010:write_comp_data kernel/kcov.c:221 [inline]\nRIP: 0010:__sanitizer_cov_trace_const_cmp1+0x1d/0x80 kernel/kcov.c:273\nCode: 54 c8 20 48 89 10 c3 66 0f 1f 44 00 00 53 41 89 fb 41 89 f1 bf 03 00 00 00 65 48 8b 0c 25 40 70 02 00 48 89 ce 4c 8b 54 24 08 <e8> 4e f7 ff ff 84 c0 74 51 48 8b 81 88 15 00 00 44 8b 81 84 15 00\nRSP: 0018:ffffc90000d27b28 EFLAGS: 00000246\nRAX: 0000000000000000 RBX: ffff888064bf1bf0 RCX: ffff888011928000\nRDX: ffff888011928000 RSI: ffff888011928000 RDI: 0000000000000003\nRBP: ffff888064bf1c28 R08: 0000000000000000 R09: 0000000000000000\nR10: ffffffff875d8295 R11: 0000000000000000 R12: 0000000000000000\nR13: ffff8880783dd300 R14: 0000000000000000 R15: 0000000000000000\n pie_calculate_probability+0x405/0x7c0 net/sched/sch_pie.c:418\n fq_pie_timer+0x170/0x2a0 net/sched/sch_fq_pie.c:383\n call_timer_fn+0x1a5/0x6b0 kernel/time/timer.c:1421\n expire_timers kernel/time/timer.c:1466 [inline]\n __run_timers.part.0+0x675/0xa20 kernel/time/timer.c:1734\n __run_timers kernel/time/timer.c:1715 [inline]\n run_timer_softirq+0xb3/0x1d0 kernel/time/timer.c:1747\n __do_softirq+0x29b/0x9c2 kernel/softirq.c:558\n run_ksoftirqd kernel/softirq.c:921 [inline]\n run_ksoftirqd+0x2d/0x60 kernel/softirq.c:913\n smpboot_thread_fn+0x645/0x9c0 kernel/smpboot.c:164\n kthread+0x405/0x4f0 kernel/kthread.c:327\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295\n </TASK>", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47512", url: "https://www.suse.com/security/cve/CVE-2021-47512", }, { category: "external", summary: "SUSE Bug 1225424 for CVE-2021-47512", url: "https://bugzilla.suse.com/1225424", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47512", }, { cve: "CVE-2021-47513", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47513", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dsa: felix: Fix memory leak in felix_setup_mmio_filtering\n\nAvoid a memory leak if there is not a CPU port defined.\n\nAddresses-Coverity-ID: 1492897 (\"Resource leak\")\nAddresses-Coverity-ID: 1492899 (\"Resource leak\")", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47513", url: "https://www.suse.com/security/cve/CVE-2021-47513", }, { category: "external", summary: "SUSE Bug 1225380 for CVE-2021-47513", url: "https://bugzilla.suse.com/1225380", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47513", }, { cve: "CVE-2021-47514", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47514", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndevlink: fix netns refcount leak in devlink_nl_cmd_reload()\n\nWhile preparing my patch series adding netns refcount tracking,\nI spotted bugs in devlink_nl_cmd_reload()\n\nSome error paths forgot to release a refcount on a netns.\n\nTo fix this, we can reduce the scope of get_net()/put_net()\nsection around the call to devlink_reload().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47514", url: "https://www.suse.com/security/cve/CVE-2021-47514", }, { category: "external", summary: "SUSE Bug 1225425 for CVE-2021-47514", url: "https://bugzilla.suse.com/1225425", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47514", }, { cve: "CVE-2021-47516", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47516", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnfp: Fix memory leak in nfp_cpp_area_cache_add()\n\nIn line 800 (#1), nfp_cpp_area_alloc() allocates and initializes a\nCPP area structure. But in line 807 (#2), when the cache is allocated\nfailed, this CPP area structure is not freed, which will result in\nmemory leak.\n\nWe can fix it by freeing the CPP area when the cache is allocated\nfailed (#2).\n\n792 int nfp_cpp_area_cache_add(struct nfp_cpp *cpp, size_t size)\n793 {\n794 \tstruct nfp_cpp_area_cache *cache;\n795 \tstruct nfp_cpp_area *area;\n\n800\tarea = nfp_cpp_area_alloc(cpp, NFP_CPP_ID(7, NFP_CPP_ACTION_RW, 0),\n801 \t\t\t\t 0, size);\n\t// #1: allocates and initializes\n\n802 \tif (!area)\n803 \t\treturn -ENOMEM;\n\n805 \tcache = kzalloc(sizeof(*cache), GFP_KERNEL);\n806 \tif (!cache)\n807 \t\treturn -ENOMEM; // #2: missing free\n\n817\treturn 0;\n818 }", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47516", url: "https://www.suse.com/security/cve/CVE-2021-47516", }, { category: "external", summary: "SUSE Bug 1225427 for CVE-2021-47516", url: "https://bugzilla.suse.com/1225427", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47516", }, { cve: "CVE-2021-47518", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47518", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done\n\nThe done() netlink callback nfc_genl_dump_ses_done() should check if\nreceived argument is non-NULL, because its allocation could fail earlier\nin dumpit() (nfc_genl_dump_ses()).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47518", url: "https://www.suse.com/security/cve/CVE-2021-47518", }, { category: "external", summary: "SUSE Bug 1225372 for CVE-2021-47518", url: "https://bugzilla.suse.com/1225372", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47518", }, { cve: "CVE-2021-47520", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47520", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: pch_can: pch_can_rx_normal: fix use after free\n\nAfter calling netif_receive_skb(skb), dereferencing skb is unsafe.\nEspecially, the can_frame cf which aliases skb memory is dereferenced\njust after the call netif_receive_skb(skb).\n\nReordering the lines solves the issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47520", url: "https://www.suse.com/security/cve/CVE-2021-47520", }, { category: "external", summary: "SUSE Bug 1225431 for CVE-2021-47520", url: "https://bugzilla.suse.com/1225431", }, { category: "external", summary: "SUSE Bug 1227905 for CVE-2021-47520", url: "https://bugzilla.suse.com/1227905", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2021-47520", }, { cve: "CVE-2021-47521", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47521", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: sja1000: fix use after free in ems_pcmcia_add_card()\n\nIf the last channel is not available then \"dev\" is freed. Fortunately,\nwe can just use \"pdev->irq\" instead.\n\nAlso we should check if at least one channel was set up.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47521", url: "https://www.suse.com/security/cve/CVE-2021-47521", }, { category: "external", summary: "SUSE Bug 1225435 for CVE-2021-47521", url: "https://bugzilla.suse.com/1225435", }, { category: "external", summary: "SUSE Bug 1227696 for CVE-2021-47521", url: "https://bugzilla.suse.com/1227696", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2021-47521", }, { cve: "CVE-2021-47522", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47522", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: bigbenff: prevent null pointer dereference\n\nWhen emulating the device through uhid, there is a chance we don't have\noutput reports and so report_field is null.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47522", url: "https://www.suse.com/security/cve/CVE-2021-47522", }, { category: "external", summary: "SUSE Bug 1225437 for CVE-2021-47522", url: "https://bugzilla.suse.com/1225437", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47522", }, { cve: "CVE-2021-47523", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47523", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr\n\nThis buffer is currently allocated in hfi1_init():\n\n\tif (reinit)\n\t\tret = init_after_reset(dd);\n\telse\n\t\tret = loadtime_init(dd);\n\tif (ret)\n\t\tgoto done;\n\n\t/* allocate dummy tail memory for all receive contexts */\n\tdd->rcvhdrtail_dummy_kvaddr = dma_alloc_coherent(&dd->pcidev->dev,\n\t\t\t\t\t\t\t sizeof(u64),\n\t\t\t\t\t\t\t &dd->rcvhdrtail_dummy_dma,\n\t\t\t\t\t\t\t GFP_KERNEL);\n\n\tif (!dd->rcvhdrtail_dummy_kvaddr) {\n\t\tdd_dev_err(dd, \"cannot allocate dummy tail memory\\n\");\n\t\tret = -ENOMEM;\n\t\tgoto done;\n\t}\n\nThe reinit triggered path will overwrite the old allocation and leak it.\n\nFix by moving the allocation to hfi1_alloc_devdata() and the deallocation\nto hfi1_free_devdata().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47523", url: "https://www.suse.com/security/cve/CVE-2021-47523", }, { category: "external", summary: "SUSE Bug 1225438 for CVE-2021-47523", url: "https://bugzilla.suse.com/1225438", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47523", }, { cve: "CVE-2021-47524", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47524", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: liteuart: fix minor-number leak on probe errors\n\nMake sure to release the allocated minor number before returning on\nprobe errors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47524", url: "https://www.suse.com/security/cve/CVE-2021-47524", }, { category: "external", summary: "SUSE Bug 1225377 for CVE-2021-47524", url: "https://bugzilla.suse.com/1225377", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47524", }, { cve: "CVE-2021-47525", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47525", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: liteuart: fix use-after-free and memleak on unbind\n\nDeregister the port when unbinding the driver to prevent it from being\nused after releasing the driver data and leaking memory allocated by\nserial core.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47525", url: "https://www.suse.com/security/cve/CVE-2021-47525", }, { category: "external", summary: "SUSE Bug 1225441 for CVE-2021-47525", url: "https://bugzilla.suse.com/1225441", }, { category: "external", summary: "SUSE Bug 1227697 for CVE-2021-47525", url: "https://bugzilla.suse.com/1227697", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2021-47525", }, { cve: "CVE-2021-47526", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47526", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: liteuart: Fix NULL pointer dereference in ->remove()\n\ndrvdata has to be set in _probe() - otherwise platform_get_drvdata()\ncauses null pointer dereference BUG in _remove().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47526", url: "https://www.suse.com/security/cve/CVE-2021-47526", }, { category: "external", summary: "SUSE Bug 1225376 for CVE-2021-47526", url: "https://bugzilla.suse.com/1225376", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47526", }, { cve: "CVE-2021-47528", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47528", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: cdnsp: Fix a NULL pointer dereference in cdnsp_endpoint_init()\n\nIn cdnsp_endpoint_init(), cdnsp_ring_alloc() is assigned to pep->ring\nand there is a dereference of it in cdnsp_endpoint_init(), which could\nlead to a NULL pointer dereference on failure of cdnsp_ring_alloc().\n\nFix this bug by adding a check of pep->ring.\n\nThis bug was found by a static analyzer. The analysis employs\ndifferential checking to identify inconsistent security operations\n(e.g., checks or kfrees) between two code paths and confirms that the\ninconsistent operations are not recovered in the current function or\nthe callers, so they constitute bugs.\n\nNote that, as a bug found by static analysis, it can be a false\npositive or hard to trigger. Multiple researchers have cross-reviewed\nthe bug.\n\nBuilds with CONFIG_USB_CDNSP_GADGET=y show no new warnings,\nand our static analyzer no longer warns about this code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47528", url: "https://www.suse.com/security/cve/CVE-2021-47528", }, { category: "external", summary: "SUSE Bug 1225368 for CVE-2021-47528", url: "https://bugzilla.suse.com/1225368", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47528", }, { cve: "CVE-2021-47529", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47529", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\niwlwifi: Fix memory leaks in error handling path\n\nShould an error occur (invalid TLV len or memory allocation failure), the\nmemory already allocated in 'reduce_power_data' should be freed before\nreturning, otherwise it is leaking.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47529", url: "https://www.suse.com/security/cve/CVE-2021-47529", }, { category: "external", summary: "SUSE Bug 1225373 for CVE-2021-47529", url: "https://bugzilla.suse.com/1225373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47529", }, { cve: "CVE-2021-47530", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47530", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm: Fix wait_fence submitqueue leak\n\nWe weren't dropping the submitqueue reference in all paths. In\nparticular, when the fence has already been signalled. Split out\na helper to simplify handling this in the various different return\npaths.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47530", url: "https://www.suse.com/security/cve/CVE-2021-47530", }, { category: "external", summary: "SUSE Bug 1225442 for CVE-2021-47530", url: "https://bugzilla.suse.com/1225442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47530", }, { cve: "CVE-2021-47531", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47531", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm: Fix mmap to include VM_IO and VM_DONTDUMP\n\nIn commit 510410bfc034 (\"drm/msm: Implement mmap as GEM object\nfunction\") we switched to a new/cleaner method of doing things. That's\ngood, but we missed a little bit.\n\nBefore that commit, we used to _first_ run through the\ndrm_gem_mmap_obj() case where `obj->funcs->mmap()` was NULL. That meant\nthat we ran:\n\n vma->vm_flags |= VM_IO | VM_PFNMAP | VM_DONTEXPAND | VM_DONTDUMP;\n vma->vm_page_prot = pgprot_writecombine(vm_get_page_prot(vma->vm_flags));\n vma->vm_page_prot = pgprot_decrypted(vma->vm_page_prot);\n\n...and _then_ we modified those mappings with our own. Now that\n`obj->funcs->mmap()` is no longer NULL we don't run the default\ncode. It looks like the fact that the vm_flags got VM_IO / VM_DONTDUMP\nwas important because we're now getting crashes on Chromebooks that\nuse ARC++ while logging out. Specifically a crash that looks like this\n(this is on a 5.10 kernel w/ relevant backports but also seen on a\n5.15 kernel):\n\n Unable to handle kernel paging request at virtual address ffffffc008000000\n Mem abort info:\n ESR = 0x96000006\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n Data abort info:\n ISV = 0, ISS = 0x00000006\n CM = 0, WnR = 0\n swapper pgtable: 4k pages, 39-bit VAs, pgdp=000000008293d000\n [ffffffc008000000] pgd=00000001002b3003, p4d=00000001002b3003,\n pud=00000001002b3003, pmd=0000000000000000\n Internal error: Oops: 96000006 [#1] PREEMPT SMP\n [...]\n CPU: 7 PID: 15734 Comm: crash_dump64 Tainted: G W 5.10.67 #1 [...]\n Hardware name: Qualcomm Technologies, Inc. sc7280 IDP SKU2 platform (DT)\n pstate: 80400009 (Nzcv daif +PAN -UAO -TCO BTYPE=--)\n pc : __arch_copy_to_user+0xc0/0x30c\n lr : copyout+0xac/0x14c\n [...]\n Call trace:\n __arch_copy_to_user+0xc0/0x30c\n copy_page_to_iter+0x1a0/0x294\n process_vm_rw_core+0x240/0x408\n process_vm_rw+0x110/0x16c\n __arm64_sys_process_vm_readv+0x30/0x3c\n el0_svc_common+0xf8/0x250\n do_el0_svc+0x30/0x80\n el0_svc+0x10/0x1c\n el0_sync_handler+0x78/0x108\n el0_sync+0x184/0x1c0\n Code: f8408423 f80008c3 910020c6 36100082 (b8404423)\n\nLet's add the two flags back in.\n\nWhile we're at it, the fact that we aren't running the default means\nthat we _don't_ need to clear out VM_PFNMAP, so remove that and save\nan instruction.\n\nNOTE: it was confirmed that VM_IO was the important flag to fix the\nproblem I was seeing, but adding back VM_DONTDUMP seems like a sane\nthing to do so I'm doing that too.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47531", url: "https://www.suse.com/security/cve/CVE-2021-47531", }, { category: "external", summary: "SUSE Bug 1225443 for CVE-2021-47531", url: "https://bugzilla.suse.com/1225443", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47531", }, { cve: "CVE-2021-47532", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47532", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/devfreq: Fix OPP refcnt leak", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47532", url: "https://www.suse.com/security/cve/CVE-2021-47532", }, { category: "external", summary: "SUSE Bug 1225444 for CVE-2021-47532", url: "https://bugzilla.suse.com/1225444", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47532", }, { cve: "CVE-2021-47533", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47533", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vc4: kms: Clear the HVS FIFO commit pointer once done\n\nCommit 9ec03d7f1ed3 (\"drm/vc4: kms: Wait on previous FIFO users before a\ncommit\") introduced a wait on the previous commit done on a given HVS\nFIFO.\n\nHowever, we never cleared that pointer once done. Since\ndrm_crtc_commit_put can free the drm_crtc_commit structure directly if\nwe were the last user, this means that it can lead to a use-after free\nif we were to duplicate the state, and that stale pointer would even be\ncopied to the new state.\n\nSet the pointer to NULL once we're done with the wait so that we don't\ncarry over a pointer to a free'd structure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47533", url: "https://www.suse.com/security/cve/CVE-2021-47533", }, { category: "external", summary: "SUSE Bug 1225445 for CVE-2021-47533", url: "https://bugzilla.suse.com/1225445", }, { category: "external", summary: "SUSE Bug 1227498 for CVE-2021-47533", url: "https://bugzilla.suse.com/1227498", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2021-47533", }, { cve: "CVE-2021-47534", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47534", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vc4: kms: Add missing drm_crtc_commit_put\n\nCommit 9ec03d7f1ed3 (\"drm/vc4: kms: Wait on previous FIFO users before a\ncommit\") introduced a global state for the HVS, with each FIFO storing\nthe current CRTC commit so that we can properly synchronize commits.\n\nHowever, the refcounting was off and we thus ended up leaking the\ndrm_crtc_commit structure every commit. Add a drm_crtc_commit_put to\nprevent the leakage.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47534", url: "https://www.suse.com/security/cve/CVE-2021-47534", }, { category: "external", summary: "SUSE Bug 1230903 for CVE-2021-47534", url: "https://bugzilla.suse.com/1230903", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47534", }, { cve: "CVE-2021-47535", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47535", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/a6xx: Allocate enough space for GMU registers\n\nIn commit 142639a52a01 (\"drm/msm/a6xx: fix crashstate capture for\nA650\") we changed a6xx_get_gmu_registers() to read 3 sets of\nregisters. Unfortunately, we didn't change the memory allocation for\nthe array. That leads to a KASAN warning (this was on the chromeos-5.4\nkernel, which has the problematic commit backported to it):\n\n BUG: KASAN: slab-out-of-bounds in _a6xx_get_gmu_registers+0x144/0x430\n Write of size 8 at addr ffffff80c89432b0 by task A618-worker/209\n CPU: 5 PID: 209 Comm: A618-worker Tainted: G W 5.4.156-lockdep #22\n Hardware name: Google Lazor Limozeen without Touchscreen (rev5 - rev8) (DT)\n Call trace:\n dump_backtrace+0x0/0x248\n show_stack+0x20/0x2c\n dump_stack+0x128/0x1ec\n print_address_description+0x88/0x4a0\n __kasan_report+0xfc/0x120\n kasan_report+0x10/0x18\n __asan_report_store8_noabort+0x1c/0x24\n _a6xx_get_gmu_registers+0x144/0x430\n a6xx_gpu_state_get+0x330/0x25d4\n msm_gpu_crashstate_capture+0xa0/0x84c\n recover_worker+0x328/0x838\n kthread_worker_fn+0x32c/0x574\n kthread+0x2dc/0x39c\n ret_from_fork+0x10/0x18\n\n Allocated by task 209:\n __kasan_kmalloc+0xfc/0x1c4\n kasan_kmalloc+0xc/0x14\n kmem_cache_alloc_trace+0x1f0/0x2a0\n a6xx_gpu_state_get+0x164/0x25d4\n msm_gpu_crashstate_capture+0xa0/0x84c\n recover_worker+0x328/0x838\n kthread_worker_fn+0x32c/0x574\n kthread+0x2dc/0x39c\n ret_from_fork+0x10/0x18", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47535", url: "https://www.suse.com/security/cve/CVE-2021-47535", }, { category: "external", summary: "SUSE Bug 1225446 for CVE-2021-47535", url: "https://bugzilla.suse.com/1225446", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47535", }, { cve: "CVE-2021-47536", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47536", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: fix wrong list_del in smc_lgr_cleanup_early\n\nsmc_lgr_cleanup_early() meant to delete the link\ngroup from the link group list, but it deleted\nthe list head by mistake.\n\nThis may cause memory corruption since we didn't\nremove the real link group from the list and later\nmemseted the link group structure.\nWe got a list corruption panic when testing:\n\n[ 231.277259] list_del corruption. prev->next should be ffff8881398a8000, but was 0000000000000000\n[ 231.278222] ------------[ cut here ]------------\n[ 231.278726] kernel BUG at lib/list_debug.c:53!\n[ 231.279326] invalid opcode: 0000 [#1] SMP NOPTI\n[ 231.279803] CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.10.46+ #435\n[ 231.280466] Hardware name: Alibaba Cloud ECS, BIOS 8c24b4c 04/01/2014\n[ 231.281248] Workqueue: events smc_link_down_work\n[ 231.281732] RIP: 0010:__list_del_entry_valid+0x70/0x90\n[ 231.282258] Code: 4c 60 82 e8 7d cc 6a 00 0f 0b 48 89 fe 48 c7 c7 88 4c\n60 82 e8 6c cc 6a 00 0f 0b 48 89 fe 48 c7 c7 c0 4c 60 82 e8 5b cc 6a 00 <0f>\n0b 48 89 fe 48 c7 c7 00 4d 60 82 e8 4a cc 6a 00 0f 0b cc cc cc\n[ 231.284146] RSP: 0018:ffffc90000033d58 EFLAGS: 00010292\n[ 231.284685] RAX: 0000000000000054 RBX: ffff8881398a8000 RCX: 0000000000000000\n[ 231.285415] RDX: 0000000000000001 RSI: ffff88813bc18040 RDI: ffff88813bc18040\n[ 231.286141] RBP: ffffffff8305ad40 R08: 0000000000000003 R09: 0000000000000001\n[ 231.286873] R10: ffffffff82803da0 R11: ffffc90000033b90 R12: 0000000000000001\n[ 231.287606] R13: 0000000000000000 R14: ffff8881398a8000 R15: 0000000000000003\n[ 231.288337] FS: 0000000000000000(0000) GS:ffff88813bc00000(0000) knlGS:0000000000000000\n[ 231.289160] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 231.289754] CR2: 0000000000e72058 CR3: 000000010fa96006 CR4: 00000000003706f0\n[ 231.290485] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 231.291211] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 231.291940] Call Trace:\n[ 231.292211] smc_lgr_terminate_sched+0x53/0xa0\n[ 231.292677] smc_switch_conns+0x75/0x6b0\n[ 231.293085] ? update_load_avg+0x1a6/0x590\n[ 231.293517] ? ttwu_do_wakeup+0x17/0x150\n[ 231.293907] ? update_load_avg+0x1a6/0x590\n[ 231.294317] ? newidle_balance+0xca/0x3d0\n[ 231.294716] smcr_link_down+0x50/0x1a0\n[ 231.295090] ? __wake_up_common_lock+0x77/0x90\n[ 231.295534] smc_link_down_work+0x46/0x60\n[ 231.295933] process_one_work+0x18b/0x350", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47536", url: "https://www.suse.com/security/cve/CVE-2021-47536", }, { category: "external", summary: "SUSE Bug 1225447 for CVE-2021-47536", url: "https://bugzilla.suse.com/1225447", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47536", }, { cve: "CVE-2021-47537", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47537", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-af: Fix a memleak bug in rvu_mbox_init()\n\nIn rvu_mbox_init(), mbox_regions is not freed or passed out\nunder the switch-default region, which could lead to a memory leak.\n\nFix this bug by changing 'return err' to 'goto free_regions'.\n\nThis bug was found by a static analyzer. The analysis employs\ndifferential checking to identify inconsistent security operations\n(e.g., checks or kfrees) between two code paths and confirms that the\ninconsistent operations are not recovered in the current function or\nthe callers, so they constitute bugs.\n\nNote that, as a bug found by static analysis, it can be a false\npositive or hard to trigger. Multiple researchers have cross-reviewed\nthe bug.\n\nBuilds with CONFIG_OCTEONTX2_AF=y show no new warnings,\nand our static analyzer no longer warns about this code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47537", url: "https://www.suse.com/security/cve/CVE-2021-47537", }, { category: "external", summary: "SUSE Bug 1225375 for CVE-2021-47537", url: "https://bugzilla.suse.com/1225375", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47537", }, { cve: "CVE-2021-47540", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47540", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: mt7915: fix NULL pointer dereference in mt7915_get_phy_mode\n\nFix the following NULL pointer dereference in mt7915_get_phy_mode\nroutine adding an ibss interface to the mt7915 driver.\n\n[ 101.137097] wlan0: Trigger new scan to find an IBSS to join\n[ 102.827039] wlan0: Creating new IBSS network, BSSID 26:a4:50:1a:6e:69\n[ 103.064756] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n[ 103.073670] Mem abort info:\n[ 103.076520] ESR = 0x96000005\n[ 103.079614] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 103.084934] SET = 0, FnV = 0\n[ 103.088042] EA = 0, S1PTW = 0\n[ 103.091215] Data abort info:\n[ 103.094104] ISV = 0, ISS = 0x00000005\n[ 103.098041] CM = 0, WnR = 0\n[ 103.101044] user pgtable: 4k pages, 39-bit VAs, pgdp=00000000460b1000\n[ 103.107565] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000\n[ 103.116590] Internal error: Oops: 96000005 [#1] SMP\n[ 103.189066] CPU: 1 PID: 333 Comm: kworker/u4:3 Not tainted 5.10.75 #0\n[ 103.195498] Hardware name: MediaTek MT7622 RFB1 board (DT)\n[ 103.201124] Workqueue: phy0 ieee80211_iface_work [mac80211]\n[ 103.206695] pstate: 20000005 (nzCv daif -PAN -UAO -TCO BTYPE=--)\n[ 103.212705] pc : mt7915_get_phy_mode+0x68/0x120 [mt7915e]\n[ 103.218103] lr : mt7915_mcu_add_bss_info+0x11c/0x760 [mt7915e]\n[ 103.223927] sp : ffffffc011cdb9e0\n[ 103.227235] x29: ffffffc011cdb9e0 x28: ffffff8006563098\n[ 103.232545] x27: ffffff8005f4da22 x26: ffffff800685ac40\n[ 103.237855] x25: 0000000000000001 x24: 000000000000011f\n[ 103.243165] x23: ffffff8005f4e260 x22: ffffff8006567918\n[ 103.248475] x21: ffffff8005f4df80 x20: ffffff800685ac58\n[ 103.253785] x19: ffffff8006744400 x18: 0000000000000000\n[ 103.259094] x17: 0000000000000000 x16: 0000000000000001\n[ 103.264403] x15: 000899c3a2d9d2e4 x14: 000899bdc3c3a1c8\n[ 103.269713] x13: 0000000000000000 x12: 0000000000000000\n[ 103.275024] x11: ffffffc010e30c20 x10: 0000000000000000\n[ 103.280333] x9 : 0000000000000050 x8 : ffffff8006567d88\n[ 103.285642] x7 : ffffff8006563b5c x6 : ffffff8006563b44\n[ 103.290952] x5 : 0000000000000002 x4 : 0000000000000001\n[ 103.296262] x3 : 0000000000000001 x2 : 0000000000000001\n[ 103.301572] x1 : 0000000000000000 x0 : 0000000000000011\n[ 103.306882] Call trace:\n[ 103.309328] mt7915_get_phy_mode+0x68/0x120 [mt7915e]\n[ 103.314378] mt7915_bss_info_changed+0x198/0x200 [mt7915e]\n[ 103.319941] ieee80211_bss_info_change_notify+0x128/0x290 [mac80211]\n[ 103.326360] __ieee80211_sta_join_ibss+0x308/0x6c4 [mac80211]\n[ 103.332171] ieee80211_sta_create_ibss+0x8c/0x10c [mac80211]\n[ 103.337895] ieee80211_ibss_work+0x3dc/0x614 [mac80211]\n[ 103.343185] ieee80211_iface_work+0x388/0x3f0 [mac80211]\n[ 103.348495] process_one_work+0x288/0x690\n[ 103.352499] worker_thread+0x70/0x464\n[ 103.356157] kthread+0x144/0x150\n[ 103.359380] ret_from_fork+0x10/0x18\n[ 103.362952] Code: 394008c3 52800220 394000e4 7100007f (39400023)", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47540", url: "https://www.suse.com/security/cve/CVE-2021-47540", }, { category: "external", summary: "SUSE Bug 1225386 for CVE-2021-47540", url: "https://bugzilla.suse.com/1225386", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47540", }, { cve: "CVE-2021-47541", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47541", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()\n\nIn mlx4_en_try_alloc_resources(), mlx4_en_copy_priv() is called and\ntmp->tx_cq will be freed on the error path of mlx4_en_copy_priv().\nAfter that mlx4_en_alloc_resources() is called and there is a dereference\nof &tmp->tx_cq[t][i] in mlx4_en_alloc_resources(), which could lead to\na use after free problem on failure of mlx4_en_copy_priv().\n\nFix this bug by adding a check of mlx4_en_copy_priv()\n\nThis bug was found by a static analyzer. The analysis employs\ndifferential checking to identify inconsistent security operations\n(e.g., checks or kfrees) between two code paths and confirms that the\ninconsistent operations are not recovered in the current function or\nthe callers, so they constitute bugs.\n\nNote that, as a bug found by static analysis, it can be a false\npositive or hard to trigger. Multiple researchers have cross-reviewed\nthe bug.\n\nBuilds with CONFIG_MLX4_EN=m show no new warnings,\nand our static analyzer no longer warns about this code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47541", url: "https://www.suse.com/security/cve/CVE-2021-47541", }, { category: "external", summary: "SUSE Bug 1225453 for CVE-2021-47541", url: "https://bugzilla.suse.com/1225453", }, { category: "external", summary: "SUSE Bug 1225454 for CVE-2021-47541", url: "https://bugzilla.suse.com/1225454", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47541", }, { cve: "CVE-2021-47542", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47542", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()\n\nIn qlcnic_83xx_add_rings(), the indirect function of\nahw->hw_ops->alloc_mbx_args will be called to allocate memory for\ncmd.req.arg, and there is a dereference of it in qlcnic_83xx_add_rings(),\nwhich could lead to a NULL pointer dereference on failure of the\nindirect function like qlcnic_83xx_alloc_mbx_args().\n\nFix this bug by adding a check of alloc_mbx_args(), this patch\nimitates the logic of mbx_cmd()'s failure handling.\n\nThis bug was found by a static analyzer. The analysis employs\ndifferential checking to identify inconsistent security operations\n(e.g., checks or kfrees) between two code paths and confirms that the\ninconsistent operations are not recovered in the current function or\nthe callers, so they constitute bugs.\n\nNote that, as a bug found by static analysis, it can be a false\npositive or hard to trigger. Multiple researchers have cross-reviewed\nthe bug.\n\nBuilds with CONFIG_QLCNIC=m show no new warnings, and our\nstatic analyzer no longer warns about this code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47542", url: "https://www.suse.com/security/cve/CVE-2021-47542", }, { category: "external", summary: "SUSE Bug 1225455 for CVE-2021-47542", url: "https://bugzilla.suse.com/1225455", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47542", }, { cve: "CVE-2021-47544", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47544", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix page frag corruption on page fault\n\nSteffen reported a TCP stream corruption for HTTP requests\nserved by the apache web-server using a cifs mount-point\nand memory mapping the relevant file.\n\nThe root cause is quite similar to the one addressed by\ncommit 20eb4f29b602 (\"net: fix sk_page_frag() recursion from\nmemory reclaim\"). Here the nested access to the task page frag\nis caused by a page fault on the (mmapped) user-space memory\nbuffer coming from the cifs file.\n\nThe page fault handler performs an smb transaction on a different\nsocket, inside the same process context. Since sk->sk_allaction\nfor such socket does not prevent the usage for the task_frag,\nthe nested allocation modify \"under the hood\" the page frag\nin use by the outer sendmsg call, corrupting the stream.\n\nThe overall relevant stack trace looks like the following:\n\nhttpd 78268 [001] 3461630.850950: probe:tcp_sendmsg_locked:\n ffffffff91461d91 tcp_sendmsg_locked+0x1\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139814e sock_sendmsg+0x3e\n ffffffffc06dfe1d smb_send_kvec+0x28\n [...]\n ffffffffc06cfaf8 cifs_readpages+0x213\n ffffffff90e83c4b read_pages+0x6b\n ffffffff90e83f31 __do_page_cache_readahead+0x1c1\n ffffffff90e79e98 filemap_fault+0x788\n ffffffff90eb0458 __do_fault+0x38\n ffffffff90eb5280 do_fault+0x1a0\n ffffffff90eb7c84 __handle_mm_fault+0x4d4\n ffffffff90eb8093 handle_mm_fault+0xc3\n ffffffff90c74f6d __do_page_fault+0x1ed\n ffffffff90c75277 do_page_fault+0x37\n ffffffff9160111e page_fault+0x1e\n ffffffff9109e7b5 copyin+0x25\n ffffffff9109eb40 _copy_from_iter_full+0xe0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139815c sock_sendmsg+0x4c\n ffffffff913981f7 sock_write_iter+0x97\n ffffffff90f2cc56 do_iter_readv_writev+0x156\n ffffffff90f2dff0 do_iter_write+0x80\n ffffffff90f2e1c3 vfs_writev+0xa3\n ffffffff90f2e27c do_writev+0x5c\n ffffffff90c042bb do_syscall_64+0x5b\n ffffffff916000ad entry_SYSCALL_64_after_hwframe+0x65\n\nThe cifs filesystem rightfully sets sk_allocations to GFP_NOFS,\nwe can avoid the nesting using the sk page frag for allocation\nlacking the __GFP_FS flag. Do not define an additional mm-helper\nfor that, as this is strictly tied to the sk page frag usage.\n\nv1 -> v2:\n - use a stricted sk_page_frag() check instead of reordering the\n code (Eric)", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47544", url: "https://www.suse.com/security/cve/CVE-2021-47544", }, { category: "external", summary: "SUSE Bug 1225463 for CVE-2021-47544", url: "https://bugzilla.suse.com/1225463", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47544", }, { cve: "CVE-2021-47548", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47548", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()\n\nThe if statement:\n if (port >= DSAF_GE_NUM)\n return;\n\nlimits the value of port less than DSAF_GE_NUM (i.e., 8).\nHowever, if the value of port is 6 or 7, an array overflow could occur:\n port_rst_off = dsaf_dev->mac_cb[port]->port_rst_off;\n\nbecause the length of dsaf_dev->mac_cb is DSAF_MAX_PORT_NUM (i.e., 6).\n\nTo fix this possible array overflow, we first check port and if it is\ngreater than or equal to DSAF_MAX_PORT_NUM, the function returns.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47548", url: "https://www.suse.com/security/cve/CVE-2021-47548", }, { category: "external", summary: "SUSE Bug 1225506 for CVE-2021-47548", url: "https://bugzilla.suse.com/1225506", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47548", }, { cve: "CVE-2021-47549", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47549", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl\n\nWhen the `rmmod sata_fsl.ko` command is executed in the PPC64 GNU/Linux,\na bug is reported:\n ==================================================================\n BUG: Unable to handle kernel data access on read at 0x80000800805b502c\n Oops: Kernel access of bad area, sig: 11 [#1]\n NIP [c0000000000388a4] .ioread32+0x4/0x20\n LR [80000000000c6034] .sata_fsl_port_stop+0x44/0xe0 [sata_fsl]\n Call Trace:\n .free_irq+0x1c/0x4e0 (unreliable)\n .ata_host_stop+0x74/0xd0 [libata]\n .release_nodes+0x330/0x3f0\n .device_release_driver_internal+0x178/0x2c0\n .driver_detach+0x64/0xd0\n .bus_remove_driver+0x70/0xf0\n .driver_unregister+0x38/0x80\n .platform_driver_unregister+0x14/0x30\n .fsl_sata_driver_exit+0x18/0xa20 [sata_fsl]\n .__se_sys_delete_module+0x1ec/0x2d0\n .system_call_exception+0xfc/0x1f0\n system_call_common+0xf8/0x200\n ==================================================================\n\nThe triggering of the BUG is shown in the following stack:\n\ndriver_detach\n device_release_driver_internal\n __device_release_driver\n drv->remove(dev) --> platform_drv_remove/platform_remove\n drv->remove(dev) --> sata_fsl_remove\n iounmap(host_priv->hcr_base);\t\t\t<---- unmap\n kfree(host_priv); <---- free\n devres_release_all\n release_nodes\n dr->node.release(dev, dr->data) --> ata_host_stop\n ap->ops->port_stop(ap) --> sata_fsl_port_stop\n ioread32(hcr_base + HCONTROL) <---- UAF\n host->ops->host_stop(host)\n\nThe iounmap(host_priv->hcr_base) and kfree(host_priv) functions should\nnot be executed in drv->remove. These functions should be executed in\nhost_stop after port_stop. Therefore, we move these functions to the\nnew function sata_fsl_host_stop and bind the new function to host_stop.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47549", url: "https://www.suse.com/security/cve/CVE-2021-47549", }, { category: "external", summary: "SUSE Bug 1225508 for CVE-2021-47549", url: "https://bugzilla.suse.com/1225508", }, { category: "external", summary: "SUSE Bug 1227654 for CVE-2021-47549", url: "https://bugzilla.suse.com/1227654", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47549", }, { cve: "CVE-2021-47550", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47550", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/amdgpu: fix potential memleak\n\nIn function amdgpu_get_xgmi_hive, when kobject_init_and_add failed\nThere is a potential memleak if not call kobject_put.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47550", url: "https://www.suse.com/security/cve/CVE-2021-47550", }, { category: "external", summary: "SUSE Bug 1225379 for CVE-2021-47550", url: "https://bugzilla.suse.com/1225379", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47550", }, { cve: "CVE-2021-47551", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47551", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/amdkfd: Fix kernel panic when reset failed and been triggered again\n\nIn SRIOV configuration, the reset may failed to bring asic back to normal but stop cpsch\nalready been called, the start_cpsch will not be called since there is no resume in this\ncase. When reset been triggered again, driver should avoid to do uninitialization again.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47551", url: "https://www.suse.com/security/cve/CVE-2021-47551", }, { category: "external", summary: "SUSE Bug 1225510 for CVE-2021-47551", url: "https://bugzilla.suse.com/1225510", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47551", }, { cve: "CVE-2021-47552", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47552", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-mq: cancel blk-mq dispatch work in both blk_cleanup_queue and disk_release()\n\nFor avoiding to slow down queue destroy, we don't call\nblk_mq_quiesce_queue() in blk_cleanup_queue(), instead of delaying to\ncancel dispatch work in blk_release_queue().\n\nHowever, this way has caused kernel oops[1], reported by Changhui. The log\nshows that scsi_device can be freed before running blk_release_queue(),\nwhich is expected too since scsi_device is released after the scsi disk\nis closed and the scsi_device is removed.\n\nFixes the issue by canceling blk-mq dispatch work in both blk_cleanup_queue()\nand disk_release():\n\n1) when disk_release() is run, the disk has been closed, and any sync\ndispatch activities have been done, so canceling dispatch work is enough to\nquiesce filesystem I/O dispatch activity.\n\n2) in blk_cleanup_queue(), we only focus on passthrough request, and\npassthrough request is always explicitly allocated & freed by\nits caller, so once queue is frozen, all sync dispatch activity\nfor passthrough request has been done, then it is enough to just cancel\ndispatch work for avoiding any dispatch activity.\n\n[1] kernel panic log\n[12622.769416] BUG: kernel NULL pointer dereference, address: 0000000000000300\n[12622.777186] #PF: supervisor read access in kernel mode\n[12622.782918] #PF: error_code(0x0000) - not-present page\n[12622.788649] PGD 0 P4D 0\n[12622.791474] Oops: 0000 [#1] PREEMPT SMP PTI\n[12622.796138] CPU: 10 PID: 744 Comm: kworker/10:1H Kdump: loaded Not tainted 5.15.0+ #1\n[12622.804877] Hardware name: Dell Inc. PowerEdge R730/0H21J3, BIOS 1.5.4 10/002/2015\n[12622.813321] Workqueue: kblockd blk_mq_run_work_fn\n[12622.818572] RIP: 0010:sbitmap_get+0x75/0x190\n[12622.823336] Code: 85 80 00 00 00 41 8b 57 08 85 d2 0f 84 b1 00 00 00 45 31 e4 48 63 cd 48 8d 1c 49 48 c1 e3 06 49 03 5f 10 4c 8d 6b 40 83 f0 01 <48> 8b 33 44 89 f2 4c 89 ef 0f b6 c8 e8 fa f3 ff ff 83 f8 ff 75 58\n[12622.844290] RSP: 0018:ffffb00a446dbd40 EFLAGS: 00010202\n[12622.850120] RAX: 0000000000000001 RBX: 0000000000000300 RCX: 0000000000000004\n[12622.858082] RDX: 0000000000000006 RSI: 0000000000000082 RDI: ffffa0b7a2dfe030\n[12622.866042] RBP: 0000000000000004 R08: 0000000000000001 R09: ffffa0b742721334\n[12622.874003] R10: 0000000000000008 R11: 0000000000000008 R12: 0000000000000000\n[12622.881964] R13: 0000000000000340 R14: 0000000000000000 R15: ffffa0b7a2dfe030\n[12622.889926] FS: 0000000000000000(0000) GS:ffffa0baafb40000(0000) knlGS:0000000000000000\n[12622.898956] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[12622.905367] CR2: 0000000000000300 CR3: 0000000641210001 CR4: 00000000001706e0\n[12622.913328] Call Trace:\n[12622.916055] <TASK>\n[12622.918394] scsi_mq_get_budget+0x1a/0x110\n[12622.922969] __blk_mq_do_dispatch_sched+0x1d4/0x320\n[12622.928404] ? pick_next_task_fair+0x39/0x390\n[12622.933268] __blk_mq_sched_dispatch_requests+0xf4/0x140\n[12622.939194] blk_mq_sched_dispatch_requests+0x30/0x60\n[12622.944829] __blk_mq_run_hw_queue+0x30/0xa0\n[12622.949593] process_one_work+0x1e8/0x3c0\n[12622.954059] worker_thread+0x50/0x3b0\n[12622.958144] ? rescuer_thread+0x370/0x370\n[12622.962616] kthread+0x158/0x180\n[12622.966218] ? set_kthread_struct+0x40/0x40\n[12622.970884] ret_from_fork+0x22/0x30\n[12622.974875] </TASK>\n[12622.977309] Modules linked in: scsi_debug rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs sunrpc dm_multipath intel_rapl_msr intel_rapl_common dell_wmi_descriptor sb_edac rfkill video x86_pkg_temp_thermal intel_powerclamp dcdbas coretemp kvm_intel kvm mgag200 irqbypass i2c_algo_bit rapl drm_kms_helper ipmi_ssif intel_cstate intel_uncore syscopyarea sysfillrect sysimgblt fb_sys_fops pcspkr cec mei_me lpc_ich mei ipmi_si ipmi_devintf ipmi_msghandler acpi_power_meter drm fuse xfs libcrc32c sr_mod cdrom sd_mod t10_pi sg ixgbe ahci libahci crct10dif_pclmul crc32_pclmul crc32c_intel libata megaraid_sas ghash_clmulni_intel tg3 wdat_w\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47552", url: "https://www.suse.com/security/cve/CVE-2021-47552", }, { category: "external", summary: "SUSE Bug 1225513 for CVE-2021-47552", url: "https://bugzilla.suse.com/1225513", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47552", }, { cve: "CVE-2021-47553", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47553", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/scs: Reset task stack state in bringup_cpu()\n\nTo hot unplug a CPU, the idle task on that CPU calls a few layers of C\ncode before finally leaving the kernel. When KASAN is in use, poisoned\nshadow is left around for each of the active stack frames, and when\nshadow call stacks are in use. When shadow call stacks (SCS) are in use\nthe task's saved SCS SP is left pointing at an arbitrary point within\nthe task's shadow call stack.\n\nWhen a CPU is offlined than onlined back into the kernel, this stale\nstate can adversely affect execution. Stale KASAN shadow can alias new\nstackframes and result in bogus KASAN warnings. A stale SCS SP is\neffectively a memory leak, and prevents a portion of the shadow call\nstack being used. Across a number of hotplug cycles the idle task's\nentire shadow call stack can become unusable.\n\nWe previously fixed the KASAN issue in commit:\n\n e1b77c92981a5222 (\"sched/kasan: remove stale KASAN poison after hotplug\")\n\n... by removing any stale KASAN stack poison immediately prior to\nonlining a CPU.\n\nSubsequently in commit:\n\n f1a0a376ca0c4ef1 (\"sched/core: Initialize the idle task with preemption disabled\")\n\n... the refactoring left the KASAN and SCS cleanup in one-time idle\nthread initialization code rather than something invoked prior to each\nCPU being onlined, breaking both as above.\n\nWe fixed SCS (but not KASAN) in commit:\n\n 63acd42c0d4942f7 (\"sched/scs: Reset the shadow stack when idle_task_exit\")\n\n... but as this runs in the context of the idle task being offlined it's\npotentially fragile.\n\nTo fix these consistently and more robustly, reset the SCS SP and KASAN\nshadow of a CPU's idle task immediately before we online that CPU in\nbringup_cpu(). This ensures the idle task always has a consistent state\nwhen it is running, and removes the need to so so when exiting an idle\ntask.\n\nWhenever any thread is created, dup_task_struct() will give the task a\nstack which is free of KASAN shadow, and initialize the task's SCS SP,\nso there's no need to specially initialize either for idle thread within\ninit_idle(), as this was only necessary to handle hotplug cycles.\n\nI've tested this on arm64 with:\n\n* gcc 11.1.0, defconfig +KASAN_INLINE, KASAN_STACK\n* clang 12.0.0, defconfig +KASAN_INLINE, KASAN_STACK, SHADOW_CALL_STACK\n\n... offlining and onlining CPUS with:\n\n| while true; do\n| for C in /sys/devices/system/cpu/cpu*/online; do\n| echo 0 > $C;\n| echo 1 > $C;\n| done\n| done", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47553", url: "https://www.suse.com/security/cve/CVE-2021-47553", }, { category: "external", summary: "SUSE Bug 1225464 for CVE-2021-47553", url: "https://bugzilla.suse.com/1225464", }, { category: "external", summary: "SUSE Bug 1227558 for CVE-2021-47553", url: "https://bugzilla.suse.com/1227558", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2021-47553", }, { cve: "CVE-2021-47554", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47554", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nvdpa_sim: avoid putting an uninitialized iova_domain\n\nThe system will crash if we put an uninitialized iova_domain, this\ncould happen when an error occurs before initializing the iova_domain\nin vdpasim_create().\n\nBUG: kernel NULL pointer dereference, address: 0000000000000000\n...\nRIP: 0010:__cpuhp_state_remove_instance+0x96/0x1c0\n...\nCall Trace:\n <TASK>\n put_iova_domain+0x29/0x220\n vdpasim_free+0xd1/0x120 [vdpa_sim]\n vdpa_release_dev+0x21/0x40 [vdpa]\n device_release+0x33/0x90\n kobject_release+0x63/0x160\n vdpasim_create+0x127/0x2a0 [vdpa_sim]\n vdpasim_net_dev_add+0x7d/0xfe [vdpa_sim_net]\n vdpa_nl_cmd_dev_add_set_doit+0xe1/0x1a0 [vdpa]\n genl_family_rcv_msg_doit+0x112/0x140\n genl_rcv_msg+0xdf/0x1d0\n ...\n\nSo we must make sure the iova_domain is already initialized before\nput it.\n\nIn addition, we may get the following warning in this case:\nWARNING: ... drivers/iommu/iova.c:344 iova_cache_put+0x58/0x70\n\nSo we must make sure the iova_cache_put() is invoked only if the\niova_cache_get() is already invoked. Let's fix it together.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47554", url: "https://www.suse.com/security/cve/CVE-2021-47554", }, { category: "external", summary: "SUSE Bug 1225466 for CVE-2021-47554", url: "https://bugzilla.suse.com/1225466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47554", }, { cve: "CVE-2021-47555", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47555", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: vlan: fix underflow for the real_dev refcnt\n\nInject error before dev_hold(real_dev) in register_vlan_dev(),\nand execute the following testcase:\n\nip link add dev dummy1 type dummy\nip link add name dummy1.100 link dummy1 type vlan id 100\nip link del dev dummy1\n\nWhen the dummy netdevice is removed, we will get a WARNING as following:\n\n=======================================================================\nrefcount_t: decrement hit 0; leaking memory.\nWARNING: CPU: 2 PID: 0 at lib/refcount.c:31 refcount_warn_saturate+0xbf/0x1e0\n\nand an endless loop of:\n\n=======================================================================\nunregister_netdevice: waiting for dummy1 to become free. Usage count = -1073741824\n\nThat is because dev_put(real_dev) in vlan_dev_free() be called without\ndev_hold(real_dev) in register_vlan_dev(). It makes the refcnt of real_dev\nunderflow.\n\nMove the dev_hold(real_dev) to vlan_dev_init() which is the call-back of\nndo_init(). That makes dev_hold() and dev_put() for vlan's real_dev\nsymmetrical.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47555", url: "https://www.suse.com/security/cve/CVE-2021-47555", }, { category: "external", summary: "SUSE Bug 1225467 for CVE-2021-47555", url: "https://bugzilla.suse.com/1225467", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47555", }, { cve: "CVE-2021-47556", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47556", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()\n\nethtool_set_coalesce() now uses both the .get_coalesce() and\n.set_coalesce() callbacks. But the check for their availability is\nbuggy, so changing the coalesce settings on a device where the driver\nprovides only _one_ of the callbacks results in a NULL pointer\ndereference instead of an -EOPNOTSUPP.\n\nFix the condition so that the availability of both callbacks is\nensured. This also matches the netlink code.\n\nNote that reproducing this requires some effort - it only affects the\nlegacy ioctl path, and needs a specific combination of driver options:\n- have .get_coalesce() and .coalesce_supported but no\n .set_coalesce(), or\n- have .set_coalesce() but no .get_coalesce(). Here eg. ethtool doesn't\n cause the crash as it first attempts to call ethtool_get_coalesce()\n and bails out on error.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47556", url: "https://www.suse.com/security/cve/CVE-2021-47556", }, { category: "external", summary: "SUSE Bug 1225383 for CVE-2021-47556", url: "https://bugzilla.suse.com/1225383", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47556", }, { cve: "CVE-2021-47557", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47557", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_ets: don't peek at classes beyond 'nbands'\n\nwhen the number of DRR classes decreases, the round-robin active list can\ncontain elements that have already been freed in ets_qdisc_change(). As a\nconsequence, it's possible to see a NULL dereference crash, caused by the\nattempt to call cl->qdisc->ops->peek(cl->qdisc) when cl->qdisc is NULL:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000018\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 0 P4D 0\n Oops: 0000 [#1] PREEMPT SMP NOPTI\n CPU: 1 PID: 910 Comm: mausezahn Not tainted 5.16.0-rc1+ #475\n Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014\n RIP: 0010:ets_qdisc_dequeue+0x129/0x2c0 [sch_ets]\n Code: c5 01 41 39 ad e4 02 00 00 0f 87 18 ff ff ff 49 8b 85 c0 02 00 00 49 39 c4 0f 84 ba 00 00 00 49 8b ad c0 02 00 00 48 8b 7d 10 <48> 8b 47 18 48 8b 40 38 0f ae e8 ff d0 48 89 c3 48 85 c0 0f 84 9d\n RSP: 0000:ffffbb36c0b5fdd8 EFLAGS: 00010287\n RAX: ffff956678efed30 RBX: 0000000000000000 RCX: 0000000000000000\n RDX: 0000000000000002 RSI: ffffffff9b938dc9 RDI: 0000000000000000\n RBP: ffff956678efed30 R08: e2f3207fe360129c R09: 0000000000000000\n R10: 0000000000000001 R11: 0000000000000001 R12: ffff956678efeac0\n R13: ffff956678efe800 R14: ffff956611545000 R15: ffff95667ac8f100\n FS: 00007f2aa9120740(0000) GS:ffff95667b800000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000018 CR3: 000000011070c000 CR4: 0000000000350ee0\n Call Trace:\n <TASK>\n qdisc_peek_dequeued+0x29/0x70 [sch_ets]\n tbf_dequeue+0x22/0x260 [sch_tbf]\n __qdisc_run+0x7f/0x630\n net_tx_action+0x290/0x4c0\n __do_softirq+0xee/0x4f8\n irq_exit_rcu+0xf4/0x130\n sysvec_apic_timer_interrupt+0x52/0xc0\n asm_sysvec_apic_timer_interrupt+0x12/0x20\n RIP: 0033:0x7f2aa7fc9ad4\n Code: b9 ff ff 48 8b 54 24 18 48 83 c4 08 48 89 ee 48 89 df 5b 5d e9 ed fc ff ff 0f 1f 00 66 2e 0f 1f 84 00 00 00 00 00 f3 0f 1e fa <53> 48 83 ec 10 48 8b 05 10 64 33 00 48 8b 00 48 85 c0 0f 85 84 00\n RSP: 002b:00007ffe5d33fab8 EFLAGS: 00000202\n RAX: 0000000000000002 RBX: 0000561f72c31460 RCX: 0000561f72c31720\n RDX: 0000000000000002 RSI: 0000561f72c31722 RDI: 0000561f72c31720\n RBP: 000000000000002a R08: 00007ffe5d33fa40 R09: 0000000000000014\n R10: 0000000000000000 R11: 0000000000000246 R12: 0000561f7187e380\n R13: 0000000000000000 R14: 0000000000000000 R15: 0000561f72c31460\n </TASK>\n Modules linked in: sch_ets sch_tbf dummy rfkill iTCO_wdt intel_rapl_msr iTCO_vendor_support intel_rapl_common joydev virtio_balloon lpc_ich i2c_i801 i2c_smbus pcspkr ip_tables xfs libcrc32c crct10dif_pclmul crc32_pclmul crc32c_intel ahci libahci ghash_clmulni_intel serio_raw libata virtio_blk virtio_console virtio_net net_failover failover sunrpc dm_mirror dm_region_hash dm_log dm_mod\n CR2: 0000000000000018\n\nEnsuring that 'alist' was never zeroed [1] was not sufficient, we need to\nremove from the active list those elements that are no more SP nor DRR.\n\n[1] https://lore.kernel.org/netdev/60d274838bf09777f0371253416e8af71360bc08.1633609148.git.dcaratti@redhat.com/\n\nv3: fix race between ets_qdisc_change() and ets_qdisc_dequeue() delisting\n DRR classes beyond 'nbands' in ets_qdisc_change() with the qdisc lock\n acquired, thanks to Cong Wang.\n\nv2: when a NULL qdisc is found in the DRR active list, try to dequeue skb\n from the next list item.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47557", url: "https://www.suse.com/security/cve/CVE-2021-47557", }, { category: "external", summary: "SUSE Bug 1225468 for CVE-2021-47557", url: "https://bugzilla.suse.com/1225468", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47557", }, { cve: "CVE-2021-47558", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47558", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: Disable Tx queues when reconfiguring the interface\n\nThe Tx queues were not disabled in situations where the driver needed to\nstop the interface to apply a new configuration. This could result in a\nkernel panic when doing any of the 3 following actions:\n* reconfiguring the number of queues (ethtool -L)\n* reconfiguring the size of the ring buffers (ethtool -G)\n* installing/removing an XDP program (ip l set dev ethX xdp)\n\nPrevent the panic by making sure netif_tx_disable is called when stopping\nan interface.\n\nWithout this patch, the following kernel panic can be observed when doing\nany of the actions above:\n\nUnable to handle kernel paging request at virtual address ffff80001238d040\n[....]\n Call trace:\n dwmac4_set_addr+0x8/0x10\n dev_hard_start_xmit+0xe4/0x1ac\n sch_direct_xmit+0xe8/0x39c\n __dev_queue_xmit+0x3ec/0xaf0\n dev_queue_xmit+0x14/0x20\n[...]\n[ end trace 0000000000000002 ]---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47558", url: "https://www.suse.com/security/cve/CVE-2021-47558", }, { category: "external", summary: "SUSE Bug 1225492 for CVE-2021-47558", url: "https://bugzilla.suse.com/1225492", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47558", }, { cve: "CVE-2021-47559", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47559", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk()\n\nCoverity reports a possible NULL dereferencing problem:\n\nin smc_vlan_by_tcpsk():\n6. returned_null: netdev_lower_get_next returns NULL (checked 29 out of 30 times).\n7. var_assigned: Assigning: ndev = NULL return value from netdev_lower_get_next.\n1623 ndev = (struct net_device *)netdev_lower_get_next(ndev, &lower);\nCID 1468509 (#1 of 1): Dereference null return value (NULL_RETURNS)\n8. dereference: Dereferencing a pointer that might be NULL ndev when calling is_vlan_dev.\n1624 if (is_vlan_dev(ndev)) {\n\nRemove the manual implementation and use netdev_walk_all_lower_dev() to\niterate over the lower devices. While on it remove an obsolete function\nparameter comment.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47559", url: "https://www.suse.com/security/cve/CVE-2021-47559", }, { category: "external", summary: "SUSE Bug 1225396 for CVE-2021-47559", url: "https://bugzilla.suse.com/1225396", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47559", }, { cve: "CVE-2021-47560", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47560", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum: Protect driver from buggy firmware\n\nWhen processing port up/down events generated by the device's firmware,\nthe driver protects itself from events reported for non-existent local\nports, but not the CPU port (local port 0), which exists, but lacks a\nnetdev.\n\nThis can result in a NULL pointer dereference when calling\nnetif_carrier_{on,off}().\n\nFix this by bailing early when processing an event reported for the CPU\nport. Problem was only observed when running on top of a buggy emulator.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47560", url: "https://www.suse.com/security/cve/CVE-2021-47560", }, { category: "external", summary: "SUSE Bug 1225495 for CVE-2021-47560", url: "https://bugzilla.suse.com/1225495", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47560", }, { cve: "CVE-2021-47562", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47562", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nice: fix vsi->txq_map sizing\n\nThe approach of having XDP queue per CPU regardless of user's setting\nexposed a hidden bug that could occur in case when Rx queue count differ\nfrom Tx queue count. Currently vsi->txq_map's size is equal to the\ndoubled vsi->alloc_txq, which is not correct due to the fact that XDP\nrings were previously based on the Rx queue count. Below splat can be\nseen when ethtool -L is used and XDP rings are configured:\n\n[ 682.875339] BUG: kernel NULL pointer dereference, address: 000000000000000f\n[ 682.883403] #PF: supervisor read access in kernel mode\n[ 682.889345] #PF: error_code(0x0000) - not-present page\n[ 682.895289] PGD 0 P4D 0\n[ 682.898218] Oops: 0000 [#1] PREEMPT SMP PTI\n[ 682.903055] CPU: 42 PID: 2878 Comm: ethtool Tainted: G OE 5.15.0-rc5+ #1\n[ 682.912214] Hardware name: Intel Corp. GRANTLEY/GRANTLEY, BIOS GRRFCRB1.86B.0276.D07.1605190235 05/19/2016\n[ 682.923380] RIP: 0010:devres_remove+0x44/0x130\n[ 682.928527] Code: 49 89 f4 55 48 89 fd 4c 89 ff 53 48 83 ec 10 e8 92 b9 49 00 48 8b 9d a8 02 00 00 48 8d 8d a0 02 00 00 49 89 c2 48 39 cb 74 0f <4c> 3b 63 10 74 25 48 8b 5b 08 48 39 cb 75 f1 4c 89 ff 4c 89 d6 e8\n[ 682.950237] RSP: 0018:ffffc90006a679f0 EFLAGS: 00010002\n[ 682.956285] RAX: 0000000000000286 RBX: ffffffffffffffff RCX: ffff88908343a370\n[ 682.964538] RDX: 0000000000000001 RSI: ffffffff81690d60 RDI: 0000000000000000\n[ 682.972789] RBP: ffff88908343a0d0 R08: 0000000000000000 R09: 0000000000000000\n[ 682.981040] R10: 0000000000000286 R11: 3fffffffffffffff R12: ffffffff81690d60\n[ 682.989282] R13: ffffffff81690a00 R14: ffff8890819807a8 R15: ffff88908343a36c\n[ 682.997535] FS: 00007f08c7bfa740(0000) GS:ffff88a03fd00000(0000) knlGS:0000000000000000\n[ 683.006910] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 683.013557] CR2: 000000000000000f CR3: 0000001080a66003 CR4: 00000000003706e0\n[ 683.021819] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 683.030075] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 683.038336] Call Trace:\n[ 683.041167] devm_kfree+0x33/0x50\n[ 683.045004] ice_vsi_free_arrays+0x5e/0xc0 [ice]\n[ 683.050380] ice_vsi_rebuild+0x4c8/0x750 [ice]\n[ 683.055543] ice_vsi_recfg_qs+0x9a/0x110 [ice]\n[ 683.060697] ice_set_channels+0x14f/0x290 [ice]\n[ 683.065962] ethnl_set_channels+0x333/0x3f0\n[ 683.070807] genl_family_rcv_msg_doit+0xea/0x150\n[ 683.076152] genl_rcv_msg+0xde/0x1d0\n[ 683.080289] ? channels_prepare_data+0x60/0x60\n[ 683.085432] ? genl_get_cmd+0xd0/0xd0\n[ 683.089667] netlink_rcv_skb+0x50/0xf0\n[ 683.094006] genl_rcv+0x24/0x40\n[ 683.097638] netlink_unicast+0x239/0x340\n[ 683.102177] netlink_sendmsg+0x22e/0x470\n[ 683.106717] sock_sendmsg+0x5e/0x60\n[ 683.110756] __sys_sendto+0xee/0x150\n[ 683.114894] ? handle_mm_fault+0xd0/0x2a0\n[ 683.119535] ? do_user_addr_fault+0x1f3/0x690\n[ 683.134173] __x64_sys_sendto+0x25/0x30\n[ 683.148231] do_syscall_64+0x3b/0xc0\n[ 683.161992] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nFix this by taking into account the value that num_possible_cpus()\nyields in addition to vsi->alloc_txq instead of doubling the latter.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47562", url: "https://www.suse.com/security/cve/CVE-2021-47562", }, { category: "external", summary: "SUSE Bug 1225499 for CVE-2021-47562", url: "https://bugzilla.suse.com/1225499", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47562", }, { cve: "CVE-2021-47563", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47563", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nice: avoid bpf_prog refcount underflow\n\nIce driver has the routines for managing XDP resources that are shared\nbetween ndo_bpf op and VSI rebuild flow. The latter takes place for\nexample when user changes queue count on an interface via ethtool's\nset_channels().\n\nThere is an issue around the bpf_prog refcounting when VSI is being\nrebuilt - since ice_prepare_xdp_rings() is called with vsi->xdp_prog as\nan argument that is used later on by ice_vsi_assign_bpf_prog(), same\nbpf_prog pointers are swapped with each other. Then it is also\ninterpreted as an 'old_prog' which in turn causes us to call\nbpf_prog_put on it that will decrement its refcount.\n\nBelow splat can be interpreted in a way that due to zero refcount of a\nbpf_prog it is wiped out from the system while kernel still tries to\nrefer to it:\n\n[ 481.069429] BUG: unable to handle page fault for address: ffffc9000640f038\n[ 481.077390] #PF: supervisor read access in kernel mode\n[ 481.083335] #PF: error_code(0x0000) - not-present page\n[ 481.089276] PGD 100000067 P4D 100000067 PUD 1001cb067 PMD 106d2b067 PTE 0\n[ 481.097141] Oops: 0000 [#1] PREEMPT SMP PTI\n[ 481.101980] CPU: 12 PID: 3339 Comm: sudo Tainted: G OE 5.15.0-rc5+ #1\n[ 481.110840] Hardware name: Intel Corp. GRANTLEY/GRANTLEY, BIOS GRRFCRB1.86B.0276.D07.1605190235 05/19/2016\n[ 481.122021] RIP: 0010:dev_xdp_prog_id+0x25/0x40\n[ 481.127265] Code: 80 00 00 00 00 0f 1f 44 00 00 89 f6 48 c1 e6 04 48 01 fe 48 8b 86 98 08 00 00 48 85 c0 74 13 48 8b 50 18 31 c0 48 85 d2 74 07 <48> 8b 42 38 8b 40 20 c3 48 8b 96 90 08 00 00 eb e8 66 2e 0f 1f 84\n[ 481.148991] RSP: 0018:ffffc90007b63868 EFLAGS: 00010286\n[ 481.155034] RAX: 0000000000000000 RBX: ffff889080824000 RCX: 0000000000000000\n[ 481.163278] RDX: ffffc9000640f000 RSI: ffff889080824010 RDI: ffff889080824000\n[ 481.171527] RBP: ffff888107af7d00 R08: 0000000000000000 R09: ffff88810db5f6e0\n[ 481.179776] R10: 0000000000000000 R11: ffff8890885b9988 R12: ffff88810db5f4bc\n[ 481.188026] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[ 481.196276] FS: 00007f5466d5bec0(0000) GS:ffff88903fb00000(0000) knlGS:0000000000000000\n[ 481.205633] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 481.212279] CR2: ffffc9000640f038 CR3: 000000014429c006 CR4: 00000000003706e0\n[ 481.220530] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 481.228771] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 481.237029] Call Trace:\n[ 481.239856] rtnl_fill_ifinfo+0x768/0x12e0\n[ 481.244602] rtnl_dump_ifinfo+0x525/0x650\n[ 481.249246] ? __alloc_skb+0xa5/0x280\n[ 481.253484] netlink_dump+0x168/0x3c0\n[ 481.257725] netlink_recvmsg+0x21e/0x3e0\n[ 481.262263] ____sys_recvmsg+0x87/0x170\n[ 481.266707] ? __might_fault+0x20/0x30\n[ 481.271046] ? _copy_from_user+0x66/0xa0\n[ 481.275591] ? iovec_from_user+0xf6/0x1c0\n[ 481.280226] ___sys_recvmsg+0x82/0x100\n[ 481.284566] ? sock_sendmsg+0x5e/0x60\n[ 481.288791] ? __sys_sendto+0xee/0x150\n[ 481.293129] __sys_recvmsg+0x56/0xa0\n[ 481.297267] do_syscall_64+0x3b/0xc0\n[ 481.301395] entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 481.307238] RIP: 0033:0x7f5466f39617\n[ 481.311373] Code: 0c 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb bd 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2f 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10\n[ 481.342944] RSP: 002b:00007ffedc7f4308 EFLAGS: 00000246 ORIG_RAX: 000000000000002f\n[ 481.361783] RAX: ffffffffffffffda RBX: 00007ffedc7f5460 RCX: 00007f5466f39617\n[ 481.380278] RDX: 0000000000000000 RSI: 00007ffedc7f5360 RDI: 0000000000000003\n[ 481.398500] RBP: 00007ffedc7f53f0 R08: 0000000000000000 R09: 000055d556f04d50\n[ 481.416463] R10: 0000000000000077 R11: 0000000000000246 R12: 00007ffedc7f5360\n[ 481.434131] R13: 00007ffedc7f5350 R14: 00007ffedc7f5344 R15: 0000000000000e98\n[ 481.451520] Modules linked in: ice\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47563", url: "https://www.suse.com/security/cve/CVE-2021-47563", }, { category: "external", summary: "SUSE Bug 1225500 for CVE-2021-47563", url: "https://bugzilla.suse.com/1225500", }, { category: "external", summary: "SUSE Bug 1227695 for CVE-2021-47563", url: "https://bugzilla.suse.com/1227695", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2021-47563", }, { cve: "CVE-2021-47564", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47564", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: marvell: prestera: fix double free issue on err path\n\nfix error path handling in prestera_bridge_port_join() that\ncases prestera driver to crash (see below).\n\n Trace:\n Internal error: Oops: 96000044 [#1] SMP\n Modules linked in: prestera_pci prestera uio_pdrv_genirq\n CPU: 1 PID: 881 Comm: ip Not tainted 5.15.0 #1\n pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : prestera_bridge_destroy+0x2c/0xb0 [prestera]\n lr : prestera_bridge_port_join+0x2cc/0x350 [prestera]\n sp : ffff800011a1b0f0\n ...\n x2 : ffff000109ca6c80 x1 : dead000000000100 x0 : dead000000000122\n Call trace:\n prestera_bridge_destroy+0x2c/0xb0 [prestera]\n prestera_bridge_port_join+0x2cc/0x350 [prestera]\n prestera_netdev_port_event.constprop.0+0x3c4/0x450 [prestera]\n prestera_netdev_event_handler+0xf4/0x110 [prestera]\n raw_notifier_call_chain+0x54/0x80\n call_netdevice_notifiers_info+0x54/0xa0\n __netdev_upper_dev_link+0x19c/0x380", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47564", url: "https://www.suse.com/security/cve/CVE-2021-47564", }, { category: "external", summary: "SUSE Bug 1225501 for CVE-2021-47564", url: "https://bugzilla.suse.com/1225501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47564", }, { cve: "CVE-2021-47565", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47565", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix kernel panic during drive powercycle test\n\nWhile looping over shost's sdev list it is possible that one\nof the drives is getting removed and its sas_target object is\nfreed but its sdev object remains intact.\n\nConsequently, a kernel panic can occur while the driver is trying to access\nthe sas_address field of sas_target object without also checking the\nsas_target object for NULL.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47565", url: "https://www.suse.com/security/cve/CVE-2021-47565", }, { category: "external", summary: "SUSE Bug 1225384 for CVE-2021-47565", url: "https://bugzilla.suse.com/1225384", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2021-47565", }, { cve: "CVE-2021-47569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47569", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: fail cancellation for EXITING tasks\n\nWARNING: CPU: 1 PID: 20 at fs/io_uring.c:6269 io_try_cancel_userdata+0x3c5/0x640 fs/io_uring.c:6269\nCPU: 1 PID: 20 Comm: kworker/1:0 Not tainted 5.16.0-rc1-syzkaller #0\nWorkqueue: events io_fallback_req_func\nRIP: 0010:io_try_cancel_userdata+0x3c5/0x640 fs/io_uring.c:6269\nCall Trace:\n <TASK>\n io_req_task_link_timeout+0x6b/0x1e0 fs/io_uring.c:6886\n io_fallback_req_func+0xf9/0x1ae fs/io_uring.c:1334\n process_one_work+0x9b2/0x1690 kernel/workqueue.c:2298\n worker_thread+0x658/0x11f0 kernel/workqueue.c:2445\n kthread+0x405/0x4f0 kernel/kthread.c:327\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295\n </TASK>\n\nWe need original task's context to do cancellations, so if it's dying\nand the callback is executed in a fallback mode, fail the cancellation\nattempt.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-47569", url: "https://www.suse.com/security/cve/CVE-2021-47569", }, { category: "external", summary: "SUSE Bug 1225515 for CVE-2021-47569", url: "https://bugzilla.suse.com/1225515", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2021-47569", }, { cve: "CVE-2022-48633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48633", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/gma500: Fix WARN_ON(lock->magic != lock) error\n\npsb_gem_unpin() calls dma_resv_lock() but the underlying ww_mutex\ngets destroyed by drm_gem_object_release() move the\ndrm_gem_object_release() call in psb_gem_free_object() to after\nthe unpin to fix the below warning:\n\n[ 79.693962] ------------[ cut here ]------------\n[ 79.693992] DEBUG_LOCKS_WARN_ON(lock->magic != lock)\n[ 79.694015] WARNING: CPU: 0 PID: 240 at kernel/locking/mutex.c:582 __ww_mutex_lock.constprop.0+0x569/0xfb0\n[ 79.694052] Modules linked in: rfcomm snd_seq_dummy snd_hrtimer qrtr bnep ath9k ath9k_common ath9k_hw snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_codec_hdmi snd_hda_intel ath3k snd_intel_dspcfg mac80211 snd_intel_sdw_acpi btusb snd_hda_codec btrtl btbcm btintel btmtk bluetooth at24 snd_hda_core snd_hwdep uvcvideo snd_seq libarc4 videobuf2_vmalloc ath videobuf2_memops videobuf2_v4l2 videobuf2_common snd_seq_device videodev acer_wmi intel_powerclamp coretemp mc snd_pcm joydev sparse_keymap ecdh_generic pcspkr wmi_bmof cfg80211 i2c_i801 i2c_smbus snd_timer snd r8169 rfkill lpc_ich soundcore acpi_cpufreq zram rtsx_pci_sdmmc mmc_core serio_raw rtsx_pci gma500_gfx(E) video wmi ip6_tables ip_tables i2c_dev fuse\n[ 79.694436] CPU: 0 PID: 240 Comm: plymouthd Tainted: G W E 6.0.0-rc3+ #490\n[ 79.694457] Hardware name: Packard Bell dot s/SJE01_CT, BIOS V1.10 07/23/2013\n[ 79.694469] RIP: 0010:__ww_mutex_lock.constprop.0+0x569/0xfb0\n[ 79.694496] Code: ff 85 c0 0f 84 15 fb ff ff 8b 05 ca 3c 11 01 85 c0 0f 85 07 fb ff ff 48 c7 c6 30 cb 84 aa 48 c7 c7 a3 e1 82 aa e8 ac 29 f8 ff <0f> 0b e9 ed fa ff ff e8 5b 83 8a ff 85 c0 74 10 44 8b 0d 98 3c 11\n[ 79.694513] RSP: 0018:ffffad1dc048bbe0 EFLAGS: 00010282\n[ 79.694623] RAX: 0000000000000028 RBX: 0000000000000000 RCX: 0000000000000000\n[ 79.694636] RDX: 0000000000000001 RSI: ffffffffaa8b0ffc RDI: 00000000ffffffff\n[ 79.694650] RBP: ffffad1dc048bc80 R08: 0000000000000000 R09: ffffad1dc048ba90\n[ 79.694662] R10: 0000000000000003 R11: ffffffffaad62fe8 R12: ffff9ff302103138\n[ 79.694675] R13: ffff9ff306ec8000 R14: ffff9ff307779078 R15: ffff9ff3014c0270\n[ 79.694690] FS: 00007ff1cccf1740(0000) GS:ffff9ff3bc200000(0000) knlGS:0000000000000000\n[ 79.694705] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 79.694719] CR2: 0000559ecbcb4420 CR3: 0000000013210000 CR4: 00000000000006f0\n[ 79.694734] Call Trace:\n[ 79.694749] <TASK>\n[ 79.694761] ? __schedule+0x47f/0x1670\n[ 79.694796] ? psb_gem_unpin+0x27/0x1a0 [gma500_gfx]\n[ 79.694830] ? lock_is_held_type+0xe3/0x140\n[ 79.694864] ? ww_mutex_lock+0x38/0xa0\n[ 79.694885] ? __cond_resched+0x1c/0x30\n[ 79.694902] ww_mutex_lock+0x38/0xa0\n[ 79.694925] psb_gem_unpin+0x27/0x1a0 [gma500_gfx]\n[ 79.694964] psb_gem_unpin+0x199/0x1a0 [gma500_gfx]\n[ 79.694996] drm_gem_object_release_handle+0x50/0x60\n[ 79.695020] ? drm_gem_object_handle_put_unlocked+0xf0/0xf0\n[ 79.695042] idr_for_each+0x4b/0xb0\n[ 79.695066] ? _raw_spin_unlock_irqrestore+0x30/0x60\n[ 79.695095] drm_gem_release+0x1c/0x30\n[ 79.695118] drm_file_free.part.0+0x1ea/0x260\n[ 79.695150] drm_release+0x6a/0x120\n[ 79.695175] __fput+0x9f/0x260\n[ 79.695203] task_work_run+0x59/0xa0\n[ 79.695227] do_exit+0x387/0xbe0\n[ 79.695250] ? seqcount_lockdep_reader_access.constprop.0+0x82/0x90\n[ 79.695275] ? lockdep_hardirqs_on+0x7d/0x100\n[ 79.695304] do_group_exit+0x33/0xb0\n[ 79.695331] __x64_sys_exit_group+0x14/0x20\n[ 79.695353] do_syscall_64+0x58/0x80\n[ 79.695376] ? up_read+0x17/0x20\n[ 79.695401] ? lock_is_held_type+0xe3/0x140\n[ 79.695429] ? asm_exc_page_fault+0x22/0x30\n[ 79.695450] ? lockdep_hardirqs_on+0x7d/0x100\n[ 79.695473] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 79.695493] RIP: 0033:0x7ff1ccefe3f1\n[ 79.695516] Code: Unable to access opcode bytes at RIP 0x7ff1ccefe3c7.\n[ 79.695607] RSP: 002b:00007ffed4413378 EFLAGS: \n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-48633", url: "https://www.suse.com/security/cve/CVE-2022-48633", }, { category: "external", summary: "SUSE Bug 1223489 for CVE-2022-48633", url: "https://bugzilla.suse.com/1223489", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2022-48633", }, { cve: "CVE-2022-48662", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48662", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/gem: Really move i915_gem_context.link under ref protection\n\ni915_perf assumes that it can use the i915_gem_context reference to\nprotect its i915->gem.contexts.list iteration. However, this requires\nthat we do not remove the context from the list until after we drop the\nfinal reference and release the struct. If, as currently, we remove the\ncontext from the list during context_close(), the link.next pointer may\nbe poisoned while we are holding the context reference and cause a GPF:\n\n[ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff\n[ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP\n[ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G E 5.17.9 #180\n[ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918.1346 09/18/2017\n[ 4070.574907] RIP: 0010:oa_configure_all_contexts.isra.0+0x222/0x350 [i915]\n[ 4070.574982] Code: 08 e8 32 6e 10 e1 4d 8b 6d 50 b8 ff ff ff ff 49 83 ed 50 f0 41 0f c1 04 24 83 f8 01 0f 84 e3 00 00 00 85 c0 0f 8e fa 00 00 00 <49> 8b 45 50 48 8d 70 b0 49 8d 45 50 48 39 44 24 10 0f 85 34 fe ff\n[ 4070.574990] RSP: 0018:ffffc90002077b78 EFLAGS: 00010202\n[ 4070.574995] RAX: 0000000000000002 RBX: 0000000000000002 RCX: 0000000000000000\n[ 4070.575000] RDX: 0000000000000001 RSI: ffffc90002077b20 RDI: ffff88810ddc7c68\n[ 4070.575004] RBP: 0000000000000001 R08: ffff888103242648 R09: fffffffffffffffc\n[ 4070.575008] R10: ffffffff82c50bc0 R11: 0000000000025c80 R12: ffff888101bf1860\n[ 4070.575012] R13: dead0000000000b0 R14: ffffc90002077c04 R15: ffff88810be5cabc\n[ 4070.575016] FS: 00007f1ed50c0780(0000) GS:ffff88885ec80000(0000) knlGS:0000000000000000\n[ 4070.575021] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 4070.575025] CR2: 00007f1ed5590280 CR3: 000000010ef6f005 CR4: 00000000003706e0\n[ 4070.575029] Call Trace:\n[ 4070.575033] <TASK>\n[ 4070.575037] lrc_configure_all_contexts+0x13e/0x150 [i915]\n[ 4070.575103] gen8_enable_metric_set+0x4d/0x90 [i915]\n[ 4070.575164] i915_perf_open_ioctl+0xbc0/0x1500 [i915]\n[ 4070.575224] ? asm_common_interrupt+0x1e/0x40\n[ 4070.575232] ? i915_oa_init_reg_state+0x110/0x110 [i915]\n[ 4070.575290] drm_ioctl_kernel+0x85/0x110\n[ 4070.575296] ? update_load_avg+0x5f/0x5e0\n[ 4070.575302] drm_ioctl+0x1d3/0x370\n[ 4070.575307] ? i915_oa_init_reg_state+0x110/0x110 [i915]\n[ 4070.575382] ? gen8_gt_irq_handler+0x46/0x130 [i915]\n[ 4070.575445] __x64_sys_ioctl+0x3c4/0x8d0\n[ 4070.575451] ? __do_softirq+0xaa/0x1d2\n[ 4070.575456] do_syscall_64+0x35/0x80\n[ 4070.575461] entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 4070.575467] RIP: 0033:0x7f1ed5c10397\n[ 4070.575471] Code: 3c 1c e8 1c ff ff ff 85 c0 79 87 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d a9 da 0d 00 f7 d8 64 89 01 48\n[ 4070.575478] RSP: 002b:00007ffd65c8d7a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\n[ 4070.575484] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007f1ed5c10397\n[ 4070.575488] RDX: 00007ffd65c8d7c0 RSI: 0000000040106476 RDI: 0000000000000006\n[ 4070.575492] RBP: 00005620972f9c60 R08: 000000000000000a R09: 0000000000000005\n[ 4070.575496] R10: 000000000000000d R11: 0000000000000246 R12: 000000000000000a\n[ 4070.575500] R13: 000000000000000d R14: 0000000000000000 R15: 00007ffd65c8d7c0\n[ 4070.575505] </TASK>\n[ 4070.575507] Modules linked in: nls_ascii(E) nls_cp437(E) vfat(E) fat(E) i915(E) x86_pkg_temp_thermal(E) intel_powerclamp(E) crct10dif_pclmul(E) crc32_pclmul(E) crc32c_intel(E) aesni_intel(E) crypto_simd(E) intel_gtt(E) cryptd(E) ttm(E) rapl(E) intel_cstate(E) drm_kms_helper(E) cfbfillrect(E) syscopyarea(E) cfbimgblt(E) intel_uncore(E) sysfillrect(E) mei_me(E) sysimgblt(E) i2c_i801(E) fb_sys_fops(E) mei(E) intel_pch_thermal(E) i2c_smbus\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-48662", url: "https://www.suse.com/security/cve/CVE-2022-48662", }, { category: "external", summary: "SUSE Bug 1223505 for CVE-2022-48662", url: "https://bugzilla.suse.com/1223505", }, { category: "external", summary: "SUSE Bug 1223521 for CVE-2022-48662", url: "https://bugzilla.suse.com/1223521", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2022-48662", }, { cve: "CVE-2022-48669", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48669", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries: Fix potential memleak in papr_get_attr()\n\n`buf` is allocated in papr_get_attr(), and krealloc() of `buf`\ncould fail. We need to free the original `buf` in the case of failure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-48669", url: "https://www.suse.com/security/cve/CVE-2022-48669", }, { category: "external", summary: "SUSE Bug 1223756 for CVE-2022-48669", url: "https://bugzilla.suse.com/1223756", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2022-48669", }, { cve: "CVE-2022-48689", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48689", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: TX zerocopy should not sense pfmemalloc status\n\nWe got a recent syzbot report [1] showing a possible misuse\nof pfmemalloc page status in TCP zerocopy paths.\n\nIndeed, for pages coming from user space or other layers,\nusing page_is_pfmemalloc() is moot, and possibly could give\nfalse positives.\n\nThere has been attempts to make page_is_pfmemalloc() more robust,\nbut not using it in the first place in this context is probably better,\nremoving cpu cycles.\n\nNote to stable teams :\n\nYou need to backport 84ce071e38a6 (\"net: introduce\n__skb_fill_page_desc_noacc\") as a prereq.\n\nRace is more probable after commit c07aea3ef4d4\n(\"mm: add a signature in struct page\") because page_is_pfmemalloc()\nis now using low order bit from page->lru.next, which can change\nmore often than page->index.\n\nLow order bit should never be set for lru.next (when used as an anchor\nin LRU list), so KCSAN report is mostly a false positive.\n\nBackporting to older kernel versions seems not necessary.\n\n[1]\nBUG: KCSAN: data-race in lru_add_fn / tcp_build_frag\n\nwrite to 0xffffea0004a1d2c8 of 8 bytes by task 18600 on cpu 0:\n__list_add include/linux/list.h:73 [inline]\nlist_add include/linux/list.h:88 [inline]\nlruvec_add_folio include/linux/mm_inline.h:105 [inline]\nlru_add_fn+0x440/0x520 mm/swap.c:228\nfolio_batch_move_lru+0x1e1/0x2a0 mm/swap.c:246\nfolio_batch_add_and_move mm/swap.c:263 [inline]\nfolio_add_lru+0xf1/0x140 mm/swap.c:490\nfilemap_add_folio+0xf8/0x150 mm/filemap.c:948\n__filemap_get_folio+0x510/0x6d0 mm/filemap.c:1981\npagecache_get_page+0x26/0x190 mm/folio-compat.c:104\ngrab_cache_page_write_begin+0x2a/0x30 mm/folio-compat.c:116\next4_da_write_begin+0x2dd/0x5f0 fs/ext4/inode.c:2988\ngeneric_perform_write+0x1d4/0x3f0 mm/filemap.c:3738\next4_buffered_write_iter+0x235/0x3e0 fs/ext4/file.c:270\next4_file_write_iter+0x2e3/0x1210\ncall_write_iter include/linux/fs.h:2187 [inline]\nnew_sync_write fs/read_write.c:491 [inline]\nvfs_write+0x468/0x760 fs/read_write.c:578\nksys_write+0xe8/0x1a0 fs/read_write.c:631\n__do_sys_write fs/read_write.c:643 [inline]\n__se_sys_write fs/read_write.c:640 [inline]\n__x64_sys_write+0x3e/0x50 fs/read_write.c:640\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nread to 0xffffea0004a1d2c8 of 8 bytes by task 18611 on cpu 1:\npage_is_pfmemalloc include/linux/mm.h:1740 [inline]\n__skb_fill_page_desc include/linux/skbuff.h:2422 [inline]\nskb_fill_page_desc include/linux/skbuff.h:2443 [inline]\ntcp_build_frag+0x613/0xb20 net/ipv4/tcp.c:1018\ndo_tcp_sendpages+0x3e8/0xaf0 net/ipv4/tcp.c:1075\ntcp_sendpage_locked net/ipv4/tcp.c:1140 [inline]\ntcp_sendpage+0x89/0xb0 net/ipv4/tcp.c:1150\ninet_sendpage+0x7f/0xc0 net/ipv4/af_inet.c:833\nkernel_sendpage+0x184/0x300 net/socket.c:3561\nsock_sendpage+0x5a/0x70 net/socket.c:1054\npipe_to_sendpage+0x128/0x160 fs/splice.c:361\nsplice_from_pipe_feed fs/splice.c:415 [inline]\n__splice_from_pipe+0x222/0x4d0 fs/splice.c:559\nsplice_from_pipe fs/splice.c:594 [inline]\ngeneric_splice_sendpage+0x89/0xc0 fs/splice.c:743\ndo_splice_from fs/splice.c:764 [inline]\ndirect_splice_actor+0x80/0xa0 fs/splice.c:931\nsplice_direct_to_actor+0x305/0x620 fs/splice.c:886\ndo_splice_direct+0xfb/0x180 fs/splice.c:974\ndo_sendfile+0x3bf/0x910 fs/read_write.c:1249\n__do_sys_sendfile64 fs/read_write.c:1317 [inline]\n__se_sys_sendfile64 fs/read_write.c:1303 [inline]\n__x64_sys_sendfile64+0x10c/0x150 fs/read_write.c:1303\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nvalue changed: 0x0000000000000000 -> 0xffffea0004a1d288\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 1 PID: 18611 Comm: syz-executor.4 Not tainted 6.0.0-rc2-syzkaller-00248-ge022620b5d05-dirty #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-48689", url: "https://www.suse.com/security/cve/CVE-2022-48689", }, { category: "external", summary: "SUSE Bug 1223959 for CVE-2022-48689", url: "https://bugzilla.suse.com/1223959", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2022-48689", }, { cve: "CVE-2022-48691", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48691", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: clean up hook list when offload flags check fails\n\nsplice back the hook list so nft_chain_release_hook() has a chance to\nrelease the hooks.\n\nBUG: memory leak\nunreferenced object 0xffff88810180b100 (size 96):\n comm \"syz-executor133\", pid 3619, jiffies 4294945714 (age 12.690s)\n hex dump (first 32 bytes):\n 28 64 23 02 81 88 ff ff 28 64 23 02 81 88 ff ff (d#.....(d#.....\n 90 a8 aa 83 ff ff ff ff 00 00 b5 0f 81 88 ff ff ................\n backtrace:\n [<ffffffff83a8c59b>] kmalloc include/linux/slab.h:600 [inline]\n [<ffffffff83a8c59b>] nft_netdev_hook_alloc+0x3b/0xc0 net/netfilter/nf_tables_api.c:1901\n [<ffffffff83a9239a>] nft_chain_parse_netdev net/netfilter/nf_tables_api.c:1998 [inline]\n [<ffffffff83a9239a>] nft_chain_parse_hook+0x33a/0x530 net/netfilter/nf_tables_api.c:2073\n [<ffffffff83a9b14b>] nf_tables_addchain.constprop.0+0x10b/0x950 net/netfilter/nf_tables_api.c:2218\n [<ffffffff83a9c41b>] nf_tables_newchain+0xa8b/0xc60 net/netfilter/nf_tables_api.c:2593\n [<ffffffff83a3d6a6>] nfnetlink_rcv_batch+0xa46/0xd20 net/netfilter/nfnetlink.c:517\n [<ffffffff83a3db79>] nfnetlink_rcv_skb_batch net/netfilter/nfnetlink.c:638 [inline]\n [<ffffffff83a3db79>] nfnetlink_rcv+0x1f9/0x220 net/netfilter/nfnetlink.c:656\n [<ffffffff83a13b17>] netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]\n [<ffffffff83a13b17>] netlink_unicast+0x397/0x4c0 net/netlink/af_netlink.c:1345\n [<ffffffff83a13fd6>] netlink_sendmsg+0x396/0x710 net/netlink/af_netlink.c:1921\n [<ffffffff83865ab6>] sock_sendmsg_nosec net/socket.c:714 [inline]\n [<ffffffff83865ab6>] sock_sendmsg+0x56/0x80 net/socket.c:734\n [<ffffffff8386601c>] ____sys_sendmsg+0x36c/0x390 net/socket.c:2482\n [<ffffffff8386a918>] ___sys_sendmsg+0xa8/0x110 net/socket.c:2536\n [<ffffffff8386aaa8>] __sys_sendmsg+0x88/0x100 net/socket.c:2565\n [<ffffffff845e5955>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n [<ffffffff845e5955>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-48691", url: "https://www.suse.com/security/cve/CVE-2022-48691", }, { category: "external", summary: "SUSE Bug 1223961 for CVE-2022-48691", url: "https://bugzilla.suse.com/1223961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2022-48691", }, { cve: "CVE-2022-48699", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48699", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/debug: fix dentry leak in update_sched_domain_debugfs\n\nKuyo reports that the pattern of using debugfs_remove(debugfs_lookup())\nleaks a dentry and with a hotplug stress test, the machine eventually\nruns out of memory.\n\nFix this up by using the newly created debugfs_lookup_and_remove() call\ninstead which properly handles the dentry reference counting logic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-48699", url: "https://www.suse.com/security/cve/CVE-2022-48699", }, { category: "external", summary: "SUSE Bug 1223996 for CVE-2022-48699", url: "https://bugzilla.suse.com/1223996", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2022-48699", }, { cve: "CVE-2022-48705", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48705", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7921e: fix crash in chip reset fail\n\nIn case of drv own fail in reset, we may need to run mac_reset several\ntimes. The sequence would trigger system crash as the log below.\n\nBecause we do not re-enable/schedule \"tx_napi\" before disable it again,\nthe process would keep waiting for state change in napi_diable(). To\navoid the problem and keep status synchronize for each run, goto final\nresource handling if drv own failed.\n\n[ 5857.353423] mt7921e 0000:3b:00.0: driver own failed\n[ 5858.433427] mt7921e 0000:3b:00.0: Timeout for driver own\n[ 5859.633430] mt7921e 0000:3b:00.0: driver own failed\n[ 5859.633444] ------------[ cut here ]------------\n[ 5859.633446] WARNING: CPU: 6 at kernel/kthread.c:659 kthread_park+0x11d\n[ 5859.633717] Workqueue: mt76 mt7921_mac_reset_work [mt7921_common]\n[ 5859.633728] RIP: 0010:kthread_park+0x11d/0x150\n[ 5859.633736] RSP: 0018:ffff8881b676fc68 EFLAGS: 00010202\n......\n[ 5859.633766] Call Trace:\n[ 5859.633768] <TASK>\n[ 5859.633771] mt7921e_mac_reset+0x176/0x6f0 [mt7921e]\n[ 5859.633778] mt7921_mac_reset_work+0x184/0x3a0 [mt7921_common]\n[ 5859.633785] ? mt7921_mac_set_timing+0x520/0x520 [mt7921_common]\n[ 5859.633794] ? __kasan_check_read+0x11/0x20\n[ 5859.633802] process_one_work+0x7ee/0x1320\n[ 5859.633810] worker_thread+0x53c/0x1240\n[ 5859.633818] kthread+0x2b8/0x370\n[ 5859.633824] ? process_one_work+0x1320/0x1320\n[ 5859.633828] ? kthread_complete_and_exit+0x30/0x30\n[ 5859.633834] ret_from_fork+0x1f/0x30\n[ 5859.633842] </TASK>", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-48705", url: "https://www.suse.com/security/cve/CVE-2022-48705", }, { category: "external", summary: "SUSE Bug 1223895 for CVE-2022-48705", url: "https://bugzilla.suse.com/1223895", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2022-48705", }, { cve: "CVE-2022-48708", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48708", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: single: fix potential NULL dereference\n\nAdded checking of pointer \"function\" in pcs_set_mux().\npinmux_generic_get_function() can return NULL and the pointer\n\"function\" was dereferenced without checking against NULL.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-48708", url: "https://www.suse.com/security/cve/CVE-2022-48708", }, { category: "external", summary: "SUSE Bug 1224942 for CVE-2022-48708", url: "https://bugzilla.suse.com/1224942", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2022-48708", }, { cve: "CVE-2022-48709", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48709", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nice: switch: fix potential memleak in ice_add_adv_recipe()\n\nWhen ice_add_special_words() fails, the 'rm' is not released, which will\nlead to a memory leak. Fix this up by going to 'err_unroll' label.\n\nCompile tested only.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-48709", url: "https://www.suse.com/security/cve/CVE-2022-48709", }, { category: "external", summary: "SUSE Bug 1225095 for CVE-2022-48709", url: "https://bugzilla.suse.com/1225095", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2022-48709", }, { cve: "CVE-2022-48710", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48710", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: fix a possible null pointer dereference\n\nIn radeon_fp_native_mode(), the return value of drm_mode_duplicate()\nis assigned to mode, which will lead to a NULL pointer dereference\non failure of drm_mode_duplicate(). Add a check to avoid npd.\n\nThe failure status of drm_cvt_mode() on the other path is checked too.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-48710", url: "https://www.suse.com/security/cve/CVE-2022-48710", }, { category: "external", summary: "SUSE Bug 1225230 for CVE-2022-48710", url: "https://bugzilla.suse.com/1225230", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2022-48710", }, { cve: "CVE-2023-0160", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-0160", }, ], notes: [ { category: "general", text: "A deadlock flaw was found in the Linux kernel's BPF subsystem. This flaw allows a local user to potentially crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-0160", url: "https://www.suse.com/security/cve/CVE-2023-0160", }, { category: "external", summary: "SUSE Bug 1209657 for CVE-2023-0160", url: "https://bugzilla.suse.com/1209657", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-0160", }, { cve: "CVE-2023-1829", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-1829", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root.\nWe recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-1829", url: "https://www.suse.com/security/cve/CVE-2023-1829", }, { category: "external", summary: "SUSE Bug 1210335 for CVE-2023-1829", url: "https://bugzilla.suse.com/1210335", }, { category: "external", summary: "SUSE Bug 1210619 for CVE-2023-1829", url: "https://bugzilla.suse.com/1210619", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-1829", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-1829", url: "https://bugzilla.suse.com/1217531", }, { category: "external", summary: "SUSE Bug 1220886 for CVE-2023-1829", url: "https://bugzilla.suse.com/1220886", }, { category: "external", summary: "SUSE Bug 1228311 for CVE-2023-1829", url: "https://bugzilla.suse.com/1228311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2023-1829", }, { cve: "CVE-2023-42755", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42755", }, ], notes: [ { category: "general", text: "A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42755", url: "https://www.suse.com/security/cve/CVE-2023-42755", }, { category: "external", summary: "SUSE Bug 1215702 for CVE-2023-42755", url: "https://bugzilla.suse.com/1215702", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-42755", }, { cve: "CVE-2023-47233", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-47233", }, ], notes: [ { category: "general", text: "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-47233", url: "https://www.suse.com/security/cve/CVE-2023-47233", }, { category: "external", summary: "SUSE Bug 1216702 for CVE-2023-47233", url: "https://bugzilla.suse.com/1216702", }, { category: "external", summary: "SUSE Bug 1224592 for CVE-2023-47233", url: "https://bugzilla.suse.com/1224592", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-47233", }, { cve: "CVE-2023-52586", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52586", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dpu: Add mutex lock in control vblank irq\n\nAdd a mutex lock to control vblank irq to synchronize vblank\nenable/disable operations happening from different threads to prevent\nrace conditions while registering/unregistering the vblank irq callback.\n\nv4: -Removed vblank_ctl_lock from dpu_encoder_virt, so it is only a\n parameter of dpu_encoder_phys.\n -Switch from atomic refcnt to a simple int counter as mutex has\n now been added\nv3: Mistakenly did not change wording in last version. It is done now.\nv2: Slightly changed wording of commit message\n\nPatchwork: https://patchwork.freedesktop.org/patch/571854/", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52586", url: "https://www.suse.com/security/cve/CVE-2023-52586", }, { category: "external", summary: "SUSE Bug 1221081 for CVE-2023-52586", url: "https://bugzilla.suse.com/1221081", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52586", }, { cve: "CVE-2023-52591", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52591", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nreiserfs: Avoid touching renamed directory if parent does not change\n\nThe VFS will not be locking moved directory if its parent does not\nchange. Change reiserfs rename code to avoid touching renamed directory\nif its parent does not change as without locking that can corrupt the\nfilesystem.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52591", url: "https://www.suse.com/security/cve/CVE-2023-52591", }, { category: "external", summary: "SUSE Bug 1221044 for CVE-2023-52591", url: "https://bugzilla.suse.com/1221044", }, { category: "external", summary: "SUSE Bug 1221578 for CVE-2023-52591", url: "https://bugzilla.suse.com/1221578", }, { category: "external", summary: "SUSE Bug 1221598 for CVE-2023-52591", url: "https://bugzilla.suse.com/1221598", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2023-52591", }, { cve: "CVE-2023-52618", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52618", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nblock/rnbd-srv: Check for unlikely string overflow\n\nSince \"dev_search_path\" can technically be as large as PATH_MAX,\nthere was a risk of truncation when copying it and a second string\ninto \"full_path\" since it was also PATH_MAX sized. The W=1 builds were\nreporting this warning:\n\ndrivers/block/rnbd/rnbd-srv.c: In function 'process_msg_open.isra':\ndrivers/block/rnbd/rnbd-srv.c:616:51: warning: '%s' directive output may be truncated writing up to 254 bytes into a region of size between 0 and 4095 [-Wformat-truncation=]\n 616 | snprintf(full_path, PATH_MAX, \"%s/%s\",\n | ^~\nIn function 'rnbd_srv_get_full_path',\n inlined from 'process_msg_open.isra' at drivers/block/rnbd/rnbd-srv.c:721:14: drivers/block/rnbd/rnbd-srv.c:616:17: note: 'snprintf' output between 2 and 4351 bytes into a destination of size 4096\n 616 | snprintf(full_path, PATH_MAX, \"%s/%s\",\n | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n 617 | dev_search_path, dev_name);\n | ~~~~~~~~~~~~~~~~~~~~~~~~~~\n\nTo fix this, unconditionally check for truncation (as was already done\nfor the case where \"%SESSNAME%\" was present).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52618", url: "https://www.suse.com/security/cve/CVE-2023-52618", }, { category: "external", summary: "SUSE Bug 1221615 for CVE-2023-52618", url: "https://bugzilla.suse.com/1221615", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52618", }, { cve: "CVE-2023-52642", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52642", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: rc: bpf attach/detach requires write permission\n\nNote that bpf attach/detach also requires CAP_NET_ADMIN.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52642", url: "https://www.suse.com/security/cve/CVE-2023-52642", }, { category: "external", summary: "SUSE Bug 1223031 for CVE-2023-52642", url: "https://bugzilla.suse.com/1223031", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52642", }, { cve: "CVE-2023-52643", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52643", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\niio: core: fix memleak in iio_device_register_sysfs\n\nWhen iio_device_register_sysfs_group() fails, we should\nfree iio_dev_opaque->chan_attr_group.attrs to prevent\npotential memleak.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52643", url: "https://www.suse.com/security/cve/CVE-2023-52643", }, { category: "external", summary: "SUSE Bug 1222960 for CVE-2023-52643", url: "https://bugzilla.suse.com/1222960", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52643", }, { cve: "CVE-2023-52644", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52644", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled\n\nWhen QoS is disabled, the queue priority value will not map to the correct\nieee80211 queue since there is only one queue. Stop/wake queue 0 when QoS\nis disabled to prevent trying to stop/wake a non-existent queue and failing\nto stop/wake the actual queue instantiated.\n\nLog of issue before change (with kernel parameter qos=0):\n [ +5.112651] ------------[ cut here ]------------\n [ +0.000005] WARNING: CPU: 7 PID: 25513 at net/mac80211/util.c:449 __ieee80211_wake_queue+0xd5/0x180 [mac80211]\n [ +0.000067] Modules linked in: b43(O) snd_seq_dummy snd_hrtimer snd_seq snd_seq_device nft_chain_nat xt_MASQUERADE nf_nat xfrm_user xfrm_algo xt_addrtype overlay ccm af_packet amdgpu snd_hda_codec_cirrus snd_hda_codec_generic ledtrig_audio drm_exec amdxcp gpu_sched xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip6t_rpfilter ipt_rpfilter xt_pkttype xt_LOG nf_log_syslog xt_tcpudp nft_compat nf_tables nfnetlink sch_fq_codel btusb uinput iTCO_wdt ctr btrtl intel_pmc_bxt i915 intel_rapl_msr mei_hdcp mei_pxp joydev at24 watchdog btintel atkbd libps2 serio radeon btbcm vivaldi_fmap btmtk intel_rapl_common snd_hda_codec_hdmi bluetooth uvcvideo nls_iso8859_1 applesmc nls_cp437 x86_pkg_temp_thermal snd_hda_intel intel_powerclamp vfat videobuf2_vmalloc coretemp fat snd_intel_dspcfg crc32_pclmul uvc polyval_clmulni snd_intel_sdw_acpi loop videobuf2_memops snd_hda_codec tun drm_suballoc_helper polyval_generic drm_ttm_helper drm_buddy tap ecdh_generic videobuf2_v4l2 gf128mul macvlan ttm ghash_clmulni_intel ecc tg3\n [ +0.000044] videodev bridge snd_hda_core rapl crc16 drm_display_helper cec mousedev snd_hwdep evdev intel_cstate bcm5974 hid_appleir videobuf2_common stp mac_hid libphy snd_pcm drm_kms_helper acpi_als mei_me intel_uncore llc mc snd_timer intel_gtt industrialio_triggered_buffer apple_mfi_fastcharge i2c_i801 mei snd lpc_ich agpgart ptp i2c_smbus thunderbolt apple_gmux i2c_algo_bit kfifo_buf video industrialio soundcore pps_core wmi tiny_power_button sbs sbshc button ac cordic bcma mac80211 cfg80211 ssb rfkill libarc4 kvm_intel kvm drm irqbypass fuse backlight firmware_class efi_pstore configfs efivarfs dmi_sysfs ip_tables x_tables autofs4 dm_crypt cbc encrypted_keys trusted asn1_encoder tee tpm rng_core input_leds hid_apple led_class hid_generic usbhid hid sd_mod t10_pi crc64_rocksoft crc64 crc_t10dif crct10dif_generic ahci libahci libata uhci_hcd ehci_pci ehci_hcd crct10dif_pclmul crct10dif_common sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel usbcore scsi_mod libaes crypto_simd cryptd scsi_common\n [ +0.000055] usb_common rtc_cmos btrfs blake2b_generic libcrc32c crc32c_generic crc32c_intel xor raid6_pq dm_snapshot dm_bufio dm_mod dax [last unloaded: b43(O)]\n [ +0.000009] CPU: 7 PID: 25513 Comm: irq/17-b43 Tainted: G W O 6.6.7 #1-NixOS\n [ +0.000003] Hardware name: Apple Inc. MacBookPro8,3/Mac-942459F5819B171B, BIOS 87.0.0.0.0 06/13/2019\n [ +0.000001] RIP: 0010:__ieee80211_wake_queue+0xd5/0x180 [mac80211]\n [ +0.000046] Code: 00 45 85 e4 0f 85 9b 00 00 00 48 8d bd 40 09 00 00 f0 48 0f ba ad 48 09 00 00 00 72 0f 5b 5d 41 5c 41 5d 41 5e e9 cb 6d 3c d0 <0f> 0b 5b 5d 41 5c 41 5d 41 5e c3 cc cc cc cc 48 8d b4 16 94 00 00\n [ +0.000002] RSP: 0018:ffffc90003c77d60 EFLAGS: 00010097\n [ +0.000001] RAX: 0000000000000001 RBX: 0000000000000002 RCX: 0000000000000000\n [ +0.000001] RDX: 0000000000000000 RSI: 0000000000000002 RDI: ffff88820b924900\n [ +0.000002] RBP: ffff88820b924900 R08: ffffc90003c77d90 R09: 000000000003bfd0\n [ +0.000001] R10: ffff88820b924900 R11: ffffc90003c77c68 R12: 0000000000000000\n [ +0.000001] R13: 0000000000000000 R14: ffffc90003c77d90 R15: ffffffffc0fa6f40\n [ +0.000001] FS: 0000000000000000(0000) GS:ffff88846fb80000(0000) knlGS:0000000000000000\n [ +0.000001] CS: 0010 DS: 0\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52644", url: "https://www.suse.com/security/cve/CVE-2023-52644", }, { category: "external", summary: "SUSE Bug 1222961 for CVE-2023-52644", url: "https://bugzilla.suse.com/1222961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52644", }, { cve: "CVE-2023-52646", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52646", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\naio: fix mremap after fork null-deref\n\nCommit e4a0d3e720e7 (\"aio: Make it possible to remap aio ring\") introduced\na null-deref if mremap is called on an old aio mapping after fork as\nmm->ioctx_table will be set to NULL.\n\n[jmoyer@redhat.com: fix 80 column issue]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52646", url: "https://www.suse.com/security/cve/CVE-2023-52646", }, { category: "external", summary: "SUSE Bug 1223432 for CVE-2023-52646", url: "https://bugzilla.suse.com/1223432", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52646", }, { cve: "CVE-2023-52650", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52650", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/tegra: dsi: Add missing check for of_find_device_by_node\n\nAdd check for the return value of of_find_device_by_node() and return\nthe error if it fails in order to avoid NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52650", url: "https://www.suse.com/security/cve/CVE-2023-52650", }, { category: "external", summary: "SUSE Bug 1223770 for CVE-2023-52650", url: "https://bugzilla.suse.com/1223770", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52650", }, { cve: "CVE-2023-52653", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52653", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: fix a memleak in gss_import_v2_context\n\nThe ctx->mech_used.data allocated by kmemdup is not freed in neither\ngss_import_v2_context nor it only caller gss_krb5_import_sec_context,\nwhich frees ctx on error.\n\nThus, this patch reform the last call of gss_import_v2_context to the\ngss_krb5_import_ctx_v2, preventing the memleak while keepping the return\nformation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52653", url: "https://www.suse.com/security/cve/CVE-2023-52653", }, { category: "external", summary: "SUSE Bug 1223712 for CVE-2023-52653", url: "https://bugzilla.suse.com/1223712", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2023-52653", }, { cve: "CVE-2023-52654", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52654", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/af_unix: disable sending io_uring over sockets\n\nFile reference cycles have caused lots of problems for io_uring\nin the past, and it still doesn't work exactly right and races with\nunix_stream_read_generic(). The safest fix would be to completely\ndisallow sending io_uring files via sockets via SCM_RIGHT, so there\nare no possible cycles invloving registered files and thus rendering\nSCM accounting on the io_uring side unnecessary.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52654", url: "https://www.suse.com/security/cve/CVE-2023-52654", }, { category: "external", summary: "SUSE Bug 1224099 for CVE-2023-52654", url: "https://bugzilla.suse.com/1224099", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52654", }, { cve: "CVE-2023-52655", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52655", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: aqc111: check packet for fixup for true limit\n\nIf a device sends a packet that is inbetween 0\nand sizeof(u64) the value passed to skb_trim()\nas length will wrap around ending up as some very\nlarge value.\n\nThe driver will then proceed to parse the header\nlocated at that position, which will either oops or\nprocess some random value.\n\nThe fix is to check against sizeof(u64) rather than\n0, which the driver currently does. The issue exists\nsince the introduction of the driver.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52655", url: "https://www.suse.com/security/cve/CVE-2023-52655", }, { category: "external", summary: "SUSE Bug 1217169 for CVE-2023-52655", url: "https://bugzilla.suse.com/1217169", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52655", }, { cve: "CVE-2023-52656", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52656", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: drop any code related to SCM_RIGHTS\n\nThis is dead code after we dropped support for passing io_uring fds\nover SCM_RIGHTS, get rid of it.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52656", url: "https://www.suse.com/security/cve/CVE-2023-52656", }, { category: "external", summary: "SUSE Bug 1224187 for CVE-2023-52656", url: "https://bugzilla.suse.com/1224187", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2023-52656", }, { cve: "CVE-2023-52657", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52657", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"drm/amd/pm: resolve reboot exception for si oland\"\n\nThis reverts commit e490d60a2f76bff636c68ce4fe34c1b6c34bbd86.\n\nThis causes hangs on SI when DC is enabled and errors on driver\nreboot and power off cycles.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52657", url: "https://www.suse.com/security/cve/CVE-2023-52657", }, { category: "external", summary: "SUSE Bug 1224722 for CVE-2023-52657", url: "https://bugzilla.suse.com/1224722", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52657", }, { cve: "CVE-2023-52659", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52659", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type\n\nOn 64-bit platforms, the pfn_to_kaddr() macro requires that the input\nvalue is 64 bits in order to ensure that valid address bits don't get\nlost when shifting that input by PAGE_SHIFT to calculate the physical\naddress to provide a virtual address for.\n\nOne such example is in pvalidate_pages() (used by SEV-SNP guests), where\nthe GFN in the struct used for page-state change requests is a 40-bit\nbit-field, so attempts to pass this GFN field directly into\npfn_to_kaddr() ends up causing guest crashes when dealing with addresses\nabove the 1TB range due to the above.\n\nFix this issue with SEV-SNP guests, as well as any similar cases that\nmight cause issues in current/future code, by using an inline function,\ninstead of a macro, so that the input is implicitly cast to the\nexpected 64-bit input type prior to performing the shift operation.\n\nWhile it might be argued that the issue is on the caller side, other\narchs/macros have taken similar approaches to deal with instances like\nthis, such as ARM explicitly casting the input to phys_addr_t:\n\n e48866647b48 (\"ARM: 8396/1: use phys_addr_t in pfn_to_kaddr()\")\n\nA C inline function is even better though.\n\n[ mingo: Refined the changelog some more & added __always_inline. ]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52659", url: "https://www.suse.com/security/cve/CVE-2023-52659", }, { category: "external", summary: "SUSE Bug 1224442 for CVE-2023-52659", url: "https://bugzilla.suse.com/1224442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52659", }, { cve: "CVE-2023-52660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52660", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: rkisp1: Fix IRQ handling due to shared interrupts\n\nThe driver requests the interrupts as IRQF_SHARED, so the interrupt\nhandlers can be called at any time. If such a call happens while the ISP\nis powered down, the SoC will hang as the driver tries to access the\nISP registers.\n\nThis can be reproduced even without the platform sharing the IRQ line:\nEnable CONFIG_DEBUG_SHIRQ and unload the driver, and the board will\nhang.\n\nFix this by adding a new field, 'irqs_enabled', which is used to bail\nout from the interrupt handler when the ISP is not operational.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52660", url: "https://www.suse.com/security/cve/CVE-2023-52660", }, { category: "external", summary: "SUSE Bug 1224443 for CVE-2023-52660", url: "https://bugzilla.suse.com/1224443", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52660", }, { cve: "CVE-2023-52661", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52661", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe()\n\nIf clk_get_sys(..., \"pll_d2_out0\") fails, the clk_get_sys() call must be\nundone.\n\nAdd the missing clk_put and a new 'put_pll_d_out0' label in the error\nhandling path, and use it.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52661", url: "https://www.suse.com/security/cve/CVE-2023-52661", }, { category: "external", summary: "SUSE Bug 1224445 for CVE-2023-52661", url: "https://bugzilla.suse.com/1224445", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2023-52661", }, { cve: "CVE-2023-52662", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52662", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node\n\nWhen ida_alloc_max fails, resources allocated before should be freed,\nincluding *res allocated by kmalloc and ttm_resource_init.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52662", url: "https://www.suse.com/security/cve/CVE-2023-52662", }, { category: "external", summary: "SUSE Bug 1224449 for CVE-2023-52662", url: "https://bugzilla.suse.com/1224449", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52662", }, { cve: "CVE-2023-52664", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52664", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atlantic: eliminate double free in error handling logic\n\nDriver has a logic leak in ring data allocation/free,\nwhere aq_ring_free could be called multiple times on same ring,\nif system is under stress and got memory allocation error.\n\nRing pointer was used as an indicator of failure, but this is\nnot correct since only ring data is allocated/deallocated.\nRing itself is an array member.\n\nChanging ring allocation functions to return error code directly.\nThis simplifies error handling and eliminates aq_ring_free\non higher layer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52664", url: "https://www.suse.com/security/cve/CVE-2023-52664", }, { category: "external", summary: "SUSE Bug 1224747 for CVE-2023-52664", url: "https://bugzilla.suse.com/1224747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52664", }, { cve: "CVE-2023-52669", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52669", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: s390/aes - Fix buffer overread in CTR mode\n\nWhen processing the last block, the s390 ctr code will always read\na whole block, even if there isn't a whole block of data left. Fix\nthis by using the actual length left and copy it into a buffer first\nfor processing.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52669", url: "https://www.suse.com/security/cve/CVE-2023-52669", }, { category: "external", summary: "SUSE Bug 1224637 for CVE-2023-52669", url: "https://bugzilla.suse.com/1224637", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52669", }, { cve: "CVE-2023-52671", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52671", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix hang/underflow when transitioning to ODM4:1\n\n[Why]\nUnder some circumstances, disabling an OPTC and attempting to reclaim\nits OPP(s) for a different OPTC could cause a hang/underflow due to OPPs\nnot being properly disconnected from the disabled OPTC.\n\n[How]\nEnsure that all OPPs are unassigned from an OPTC when it gets disabled.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52671", url: "https://www.suse.com/security/cve/CVE-2023-52671", }, { category: "external", summary: "SUSE Bug 1224729 for CVE-2023-52671", url: "https://bugzilla.suse.com/1224729", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52671", }, { cve: "CVE-2023-52674", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52674", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: scarlett2: Add clamp() in scarlett2_mixer_ctl_put()\n\nEnsure the value passed to scarlett2_mixer_ctl_put() is between 0 and\nSCARLETT2_MIXER_MAX_VALUE so we don't attempt to access outside\nscarlett2_mixer_values[].", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52674", url: "https://www.suse.com/security/cve/CVE-2023-52674", }, { category: "external", summary: "SUSE Bug 1224727 for CVE-2023-52674", url: "https://bugzilla.suse.com/1224727", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52674", }, { cve: "CVE-2023-52676", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52676", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Guard stack limits against 32bit overflow\n\nThis patch promotes the arithmetic around checking stack bounds to be\ndone in the 64-bit domain, instead of the current 32bit. The arithmetic\nimplies adding together a 64-bit register with a int offset. The\nregister was checked to be below 1<<29 when it was variable, but not\nwhen it was fixed. The offset either comes from an instruction (in which\ncase it is 16 bit), from another register (in which case the caller\nchecked it to be below 1<<29 [1]), or from the size of an argument to a\nkfunc (in which case it can be a u32 [2]). Between the register being\ninconsistently checked to be below 1<<29, and the offset being up to an\nu32, it appears that we were open to overflowing the `int`s which were\ncurrently used for arithmetic.\n\n[1] https://github.com/torvalds/linux/blob/815fb87b753055df2d9e50f6cd80eb10235fe3e9/kernel/bpf/verifier.c#L7494-L7498\n[2] https://github.com/torvalds/linux/blob/815fb87b753055df2d9e50f6cd80eb10235fe3e9/kernel/bpf/verifier.c#L11904", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52676", url: "https://www.suse.com/security/cve/CVE-2023-52676", }, { category: "external", summary: "SUSE Bug 1224730 for CVE-2023-52676", url: "https://bugzilla.suse.com/1224730", }, { category: "external", summary: "SUSE Bug 1226336 for CVE-2023-52676", url: "https://bugzilla.suse.com/1226336", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2023-52676", }, { cve: "CVE-2023-52678", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52678", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: Confirm list is non-empty before utilizing list_first_entry in kfd_topology.c\n\nBefore using list_first_entry, make sure to check that list is not\nempty, if list is empty return -ENODATA.\n\nFixes the below:\ndrivers/gpu/drm/amd/amdgpu/../amdkfd/kfd_topology.c:1347 kfd_create_indirect_link_prop() warn: can 'gpu_link' even be NULL?\ndrivers/gpu/drm/amd/amdgpu/../amdkfd/kfd_topology.c:1428 kfd_add_peer_prop() warn: can 'iolink1' even be NULL?\ndrivers/gpu/drm/amd/amdgpu/../amdkfd/kfd_topology.c:1433 kfd_add_peer_prop() warn: can 'iolink2' even be NULL?", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52678", url: "https://www.suse.com/security/cve/CVE-2023-52678", }, { category: "external", summary: "SUSE Bug 1224617 for CVE-2023-52678", url: "https://bugzilla.suse.com/1224617", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52678", }, { cve: "CVE-2023-52679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52679", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nof: Fix double free in of_parse_phandle_with_args_map\n\nIn of_parse_phandle_with_args_map() the inner loop that\niterates through the map entries calls of_node_put(new)\nto free the reference acquired by the previous iteration\nof the inner loop. This assumes that the value of \"new\" is\nNULL on the first iteration of the inner loop.\n\nMake sure that this is true in all iterations of the outer\nloop by setting \"new\" to NULL after its value is assigned to \"cur\".\n\nExtend the unittest to detect the double free and add an additional\ntest case that actually triggers this path.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52679", url: "https://www.suse.com/security/cve/CVE-2023-52679", }, { category: "external", summary: "SUSE Bug 1224508 for CVE-2023-52679", url: "https://bugzilla.suse.com/1224508", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52679", }, { cve: "CVE-2023-52680", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52680", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: scarlett2: Add missing error checks to *_ctl_get()\n\nThe *_ctl_get() functions which call scarlett2_update_*() were not\nchecking the return value. Fix to check the return value and pass to\nthe caller.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52680", url: "https://www.suse.com/security/cve/CVE-2023-52680", }, { category: "external", summary: "SUSE Bug 1224608 for CVE-2023-52680", url: "https://bugzilla.suse.com/1224608", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52680", }, { cve: "CVE-2023-52683", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52683", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: LPIT: Avoid u32 multiplication overflow\n\nIn lpit_update_residency() there is a possibility of overflow\nin multiplication, if tsc_khz is large enough (> UINT_MAX/1000).\n\nChange multiplication to mul_u32_u32().\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52683", url: "https://www.suse.com/security/cve/CVE-2023-52683", }, { category: "external", summary: "SUSE Bug 1224627 for CVE-2023-52683", url: "https://bugzilla.suse.com/1224627", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52683", }, { cve: "CVE-2023-52685", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52685", }, ], notes: [ { category: "general", text: "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52685", url: "https://www.suse.com/security/cve/CVE-2023-52685", }, { category: "external", summary: "SUSE Bug 1224728 for CVE-2023-52685", url: "https://bugzilla.suse.com/1224728", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52685", }, { cve: "CVE-2023-52686", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52686", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/powernv: Add a null pointer check in opal_event_init()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52686", url: "https://www.suse.com/security/cve/CVE-2023-52686", }, { category: "external", summary: "SUSE Bug 1224682 for CVE-2023-52686", url: "https://bugzilla.suse.com/1224682", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52686", }, { cve: "CVE-2023-52690", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52690", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/powernv: Add a null pointer check to scom_debug_init_one()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.\nAdd a null pointer check, and release 'ent' to avoid memory leaks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52690", url: "https://www.suse.com/security/cve/CVE-2023-52690", }, { category: "external", summary: "SUSE Bug 1224611 for CVE-2023-52690", url: "https://bugzilla.suse.com/1224611", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52690", }, { cve: "CVE-2023-52691", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52691", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: fix a double-free in si_dpm_init\n\nWhen the allocation of\nadev->pm.dpm.dyn_state.vddc_dependency_on_dispclk.entries fails,\namdgpu_free_extended_power_table is called to free some fields of adev.\nHowever, when the control flow returns to si_dpm_sw_init, it goes to\nlabel dpm_failed and calls si_dpm_fini, which calls\namdgpu_free_extended_power_table again and free those fields again. Thus\na double-free is triggered.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52691", url: "https://www.suse.com/security/cve/CVE-2023-52691", }, { category: "external", summary: "SUSE Bug 1224607 for CVE-2023-52691", url: "https://bugzilla.suse.com/1224607", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52691", }, { cve: "CVE-2023-52692", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52692", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: scarlett2: Add missing error check to scarlett2_usb_set_config()\n\nscarlett2_usb_set_config() calls scarlett2_usb_get() but was not\nchecking the result. Return the error if it fails rather than\ncontinuing with an invalid value.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52692", url: "https://www.suse.com/security/cve/CVE-2023-52692", }, { category: "external", summary: "SUSE Bug 1224628 for CVE-2023-52692", url: "https://bugzilla.suse.com/1224628", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52692", }, { cve: "CVE-2023-52693", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52693", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: video: check for error while searching for backlight device parent\n\nIf acpi_get_parent() called in acpi_video_dev_register_backlight()\nfails, for example, because acpi_ut_acquire_mutex() fails inside\nacpi_get_parent), this can lead to incorrect (uninitialized)\nacpi_parent handle being passed to acpi_get_pci_dev() for detecting\nthe parent pci device.\n\nCheck acpi_get_parent() result and set parent device only in case of success.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52693", url: "https://www.suse.com/security/cve/CVE-2023-52693", }, { category: "external", summary: "SUSE Bug 1224686 for CVE-2023-52693", url: "https://bugzilla.suse.com/1224686", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52693", }, { cve: "CVE-2023-52694", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52694", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/bridge: tpd12s015: Drop buggy __exit annotation for remove function\n\nWith tpd12s015_remove() marked with __exit this function is discarded\nwhen the driver is compiled as a built-in. The result is that when the\ndriver unbinds there is no cleanup done which results in resource\nleakage or worse.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52694", url: "https://www.suse.com/security/cve/CVE-2023-52694", }, { category: "external", summary: "SUSE Bug 1224598 for CVE-2023-52694", url: "https://bugzilla.suse.com/1224598", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52694", }, { cve: "CVE-2023-52696", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52696", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/powernv: Add a null pointer check in opal_powercap_init()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52696", url: "https://www.suse.com/security/cve/CVE-2023-52696", }, { category: "external", summary: "SUSE Bug 1224601 for CVE-2023-52696", url: "https://bugzilla.suse.com/1224601", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52696", }, { cve: "CVE-2023-52698", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52698", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncalipso: fix memory leak in netlbl_calipso_add_pass()\n\nIf IPv6 support is disabled at boot (ipv6.disable=1),\nthe calipso_init() -> netlbl_calipso_ops_register() function isn't called,\nand the netlbl_calipso_ops_get() function always returns NULL.\nIn this case, the netlbl_calipso_add_pass() function allocates memory\nfor the doi_def variable but doesn't free it with the calipso_doi_free().\n\nBUG: memory leak\nunreferenced object 0xffff888011d68180 (size 64):\n comm \"syz-executor.1\", pid 10746, jiffies 4295410986 (age 17.928s)\n hex dump (first 32 bytes):\n 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [<...>] kmalloc include/linux/slab.h:552 [inline]\n [<...>] netlbl_calipso_add_pass net/netlabel/netlabel_calipso.c:76 [inline]\n [<...>] netlbl_calipso_add+0x22e/0x4f0 net/netlabel/netlabel_calipso.c:111\n [<...>] genl_family_rcv_msg_doit+0x22f/0x330 net/netlink/genetlink.c:739\n [<...>] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]\n [<...>] genl_rcv_msg+0x341/0x5a0 net/netlink/genetlink.c:800\n [<...>] netlink_rcv_skb+0x14d/0x440 net/netlink/af_netlink.c:2515\n [<...>] genl_rcv+0x29/0x40 net/netlink/genetlink.c:811\n [<...>] netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]\n [<...>] netlink_unicast+0x54b/0x800 net/netlink/af_netlink.c:1339\n [<...>] netlink_sendmsg+0x90a/0xdf0 net/netlink/af_netlink.c:1934\n [<...>] sock_sendmsg_nosec net/socket.c:651 [inline]\n [<...>] sock_sendmsg+0x157/0x190 net/socket.c:671\n [<...>] ____sys_sendmsg+0x712/0x870 net/socket.c:2342\n [<...>] ___sys_sendmsg+0xf8/0x170 net/socket.c:2396\n [<...>] __sys_sendmsg+0xea/0x1b0 net/socket.c:2429\n [<...>] do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46\n [<...>] entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nFound by InfoTeCS on behalf of Linux Verification Center\n(linuxtesting.org) with Syzkaller\n\n[PM: merged via the LSM tree at Jakub Kicinski request]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52698", url: "https://www.suse.com/security/cve/CVE-2023-52698", }, { category: "external", summary: "SUSE Bug 1224621 for CVE-2023-52698", url: "https://bugzilla.suse.com/1224621", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2023-52698", }, { cve: "CVE-2023-52699", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52699", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsysv: don't call sb_bread() with pointers_lock held\n\nsyzbot is reporting sleep in atomic context in SysV filesystem [1], for\nsb_bread() is called with rw_spinlock held.\n\nA \"write_lock(&pointers_lock) => read_lock(&pointers_lock) deadlock\" bug\nand a \"sb_bread() with write_lock(&pointers_lock)\" bug were introduced by\n\"Replace BKL for chain locking with sysvfs-private rwlock\" in Linux 2.5.12.\n\nThen, \"[PATCH] err1-40: sysvfs locking fix\" in Linux 2.6.8 fixed the\nformer bug by moving pointers_lock lock to the callers, but instead\nintroduced a \"sb_bread() with read_lock(&pointers_lock)\" bug (which made\nthis problem easier to hit).\n\nAl Viro suggested that why not to do like get_branch()/get_block()/\nfind_shared() in Minix filesystem does. And doing like that is almost a\nrevert of \"[PATCH] err1-40: sysvfs locking fix\" except that get_branch()\n from with find_shared() is called without write_lock(&pointers_lock).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52699", url: "https://www.suse.com/security/cve/CVE-2023-52699", }, { category: "external", summary: "SUSE Bug 1224659 for CVE-2023-52699", url: "https://bugzilla.suse.com/1224659", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52699", }, { cve: "CVE-2023-52702", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52702", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: fix possible memory leak in ovs_meter_cmd_set()\n\nold_meter needs to be free after it is detached regardless of whether\nthe new meter is successfully attached.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52702", url: "https://www.suse.com/security/cve/CVE-2023-52702", }, { category: "external", summary: "SUSE Bug 1224945 for CVE-2023-52702", url: "https://bugzilla.suse.com/1224945", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52702", }, { cve: "CVE-2023-52703", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52703", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/usb: kalmia: Don't pass act_len in usb_bulk_msg error path\n\nsyzbot reported that act_len in kalmia_send_init_packet() is\nuninitialized when passing it to the first usb_bulk_msg error path. Jiri\nPirko noted that it's pointless to pass it in the error path, and that\nthe value that would be printed in the second error path would be the\nvalue of act_len from the first call to usb_bulk_msg.[1]\n\nWith this in mind, let's just not pass act_len to the usb_bulk_msg error\npaths.\n\n1: https://lore.kernel.org/lkml/Y9pY61y1nwTuzMOa@nanopsycho/", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52703", url: "https://www.suse.com/security/cve/CVE-2023-52703", }, { category: "external", summary: "SUSE Bug 1225549 for CVE-2023-52703", url: "https://bugzilla.suse.com/1225549", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2023-52703", }, { cve: "CVE-2023-52705", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52705", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix underflow in second superblock position calculations\n\nMacro NILFS_SB2_OFFSET_BYTES, which computes the position of the second\nsuperblock, underflows when the argument device size is less than 4096\nbytes. Therefore, when using this macro, it is necessary to check in\nadvance that the device size is not less than a lower limit, or at least\nthat underflow does not occur.\n\nThe current nilfs2 implementation lacks this check, causing out-of-bound\nblock access when mounting devices smaller than 4096 bytes:\n\n I/O error, dev loop0, sector 36028797018963960 op 0x0:(READ) flags 0x0\n phys_seg 1 prio class 2\n NILFS (loop0): unable to read secondary superblock (blocksize = 1024)\n\nIn addition, when trying to resize the filesystem to a size below 4096\nbytes, this underflow occurs in nilfs_resize_fs(), passing a huge number\nof segments to nilfs_sufile_resize(), corrupting parameters such as the\nnumber of segments in superblocks. This causes excessive loop iterations\nin nilfs_sufile_resize() during a subsequent resize ioctl, causing\nsemaphore ns_segctor_sem to block for a long time and hang the writer\nthread:\n\n INFO: task segctord:5067 blocked for more than 143 seconds.\n Not tainted 6.2.0-rc8-syzkaller-00015-gf6feea56f66d #0\n \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n task:segctord state:D stack:23456 pid:5067 ppid:2\n flags:0x00004000\n Call Trace:\n <TASK>\n context_switch kernel/sched/core.c:5293 [inline]\n __schedule+0x1409/0x43f0 kernel/sched/core.c:6606\n schedule+0xc3/0x190 kernel/sched/core.c:6682\n rwsem_down_write_slowpath+0xfcf/0x14a0 kernel/locking/rwsem.c:1190\n nilfs_transaction_lock+0x25c/0x4f0 fs/nilfs2/segment.c:357\n nilfs_segctor_thread_construct fs/nilfs2/segment.c:2486 [inline]\n nilfs_segctor_thread+0x52f/0x1140 fs/nilfs2/segment.c:2570\n kthread+0x270/0x300 kernel/kthread.c:376\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308\n </TASK>\n ...\n Call Trace:\n <TASK>\n folio_mark_accessed+0x51c/0xf00 mm/swap.c:515\n __nilfs_get_page_block fs/nilfs2/page.c:42 [inline]\n nilfs_grab_buffer+0x3d3/0x540 fs/nilfs2/page.c:61\n nilfs_mdt_submit_block+0xd7/0x8f0 fs/nilfs2/mdt.c:121\n nilfs_mdt_read_block+0xeb/0x430 fs/nilfs2/mdt.c:176\n nilfs_mdt_get_block+0x12d/0xbb0 fs/nilfs2/mdt.c:251\n nilfs_sufile_get_segment_usage_block fs/nilfs2/sufile.c:92 [inline]\n nilfs_sufile_truncate_range fs/nilfs2/sufile.c:679 [inline]\n nilfs_sufile_resize+0x7a3/0x12b0 fs/nilfs2/sufile.c:777\n nilfs_resize_fs+0x20c/0xed0 fs/nilfs2/super.c:422\n nilfs_ioctl_resize fs/nilfs2/ioctl.c:1033 [inline]\n nilfs_ioctl+0x137c/0x2440 fs/nilfs2/ioctl.c:1301\n ...\n\nThis fixes these issues by inserting appropriate minimum device size\nchecks or anti-underflow checks, depending on where the macro is used.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52705", url: "https://www.suse.com/security/cve/CVE-2023-52705", }, { category: "external", summary: "SUSE Bug 1225480 for CVE-2023-52705", url: "https://bugzilla.suse.com/1225480", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52705", }, { cve: "CVE-2023-52707", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52707", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/psi: Fix use-after-free in ep_remove_wait_queue()\n\nIf a non-root cgroup gets removed when there is a thread that registered\ntrigger and is polling on a pressure file within the cgroup, the polling\nwaitqueue gets freed in the following path:\n\n do_rmdir\n cgroup_rmdir\n kernfs_drain_open_files\n cgroup_file_release\n cgroup_pressure_release\n psi_trigger_destroy\n\nHowever, the polling thread still has a reference to the pressure file and\nwill access the freed waitqueue when the file is closed or upon exit:\n\n fput\n ep_eventpoll_release\n ep_free\n ep_remove_wait_queue\n remove_wait_queue\n\nThis results in use-after-free as pasted below.\n\nThe fundamental problem here is that cgroup_file_release() (and\nconsequently waitqueue's lifetime) is not tied to the file's real lifetime.\nUsing wake_up_pollfree() here might be less than ideal, but it is in line\nwith the comment at commit 42288cb44c4b (\"wait: add wake_up_pollfree()\")\nsince the waitqueue's lifetime is not tied to file's one and can be\nconsidered as another special case. While this would be fixable by somehow\nmaking cgroup_file_release() be tied to the fput(), it would require\nsizable refactoring at cgroups or higher layer which might be more\njustifiable if we identify more cases like this.\n\n BUG: KASAN: use-after-free in _raw_spin_lock_irqsave+0x60/0xc0\n Write of size 4 at addr ffff88810e625328 by task a.out/4404\n\n\tCPU: 19 PID: 4404 Comm: a.out Not tainted 6.2.0-rc6 #38\n\tHardware name: Amazon EC2 c5a.8xlarge/, BIOS 1.0 10/16/2017\n\tCall Trace:\n\t<TASK>\n\tdump_stack_lvl+0x73/0xa0\n\tprint_report+0x16c/0x4e0\n\tkasan_report+0xc3/0xf0\n\tkasan_check_range+0x2d2/0x310\n\t_raw_spin_lock_irqsave+0x60/0xc0\n\tremove_wait_queue+0x1a/0xa0\n\tep_free+0x12c/0x170\n\tep_eventpoll_release+0x26/0x30\n\t__fput+0x202/0x400\n\ttask_work_run+0x11d/0x170\n\tdo_exit+0x495/0x1130\n\tdo_group_exit+0x100/0x100\n\tget_signal+0xd67/0xde0\n\tarch_do_signal_or_restart+0x2a/0x2b0\n\texit_to_user_mode_prepare+0x94/0x100\n\tsyscall_exit_to_user_mode+0x20/0x40\n\tdo_syscall_64+0x52/0x90\n\tentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\t</TASK>\n\n Allocated by task 4404:\n\n\tkasan_set_track+0x3d/0x60\n\t__kasan_kmalloc+0x85/0x90\n\tpsi_trigger_create+0x113/0x3e0\n\tpressure_write+0x146/0x2e0\n\tcgroup_file_write+0x11c/0x250\n\tkernfs_fop_write_iter+0x186/0x220\n\tvfs_write+0x3d8/0x5c0\n\tksys_write+0x90/0x110\n\tdo_syscall_64+0x43/0x90\n\tentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\n Freed by task 4407:\n\n\tkasan_set_track+0x3d/0x60\n\tkasan_save_free_info+0x27/0x40\n\t____kasan_slab_free+0x11d/0x170\n\tslab_free_freelist_hook+0x87/0x150\n\t__kmem_cache_free+0xcb/0x180\n\tpsi_trigger_destroy+0x2e8/0x310\n\tcgroup_file_release+0x4f/0xb0\n\tkernfs_drain_open_files+0x165/0x1f0\n\tkernfs_drain+0x162/0x1a0\n\t__kernfs_remove+0x1fb/0x310\n\tkernfs_remove_by_name_ns+0x95/0xe0\n\tcgroup_addrm_files+0x67f/0x700\n\tcgroup_destroy_locked+0x283/0x3c0\n\tcgroup_rmdir+0x29/0x100\n\tkernfs_iop_rmdir+0xd1/0x140\n\tvfs_rmdir+0xfe/0x240\n\tdo_rmdir+0x13d/0x280\n\t__x64_sys_rmdir+0x2c/0x30\n\tdo_syscall_64+0x43/0x90\n\tentry_SYSCALL_64_after_hwframe+0x63/0xcd", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52707", url: "https://www.suse.com/security/cve/CVE-2023-52707", }, { category: "external", summary: "SUSE Bug 1225109 for CVE-2023-52707", url: "https://bugzilla.suse.com/1225109", }, { category: "external", summary: "SUSE Bug 1225190 for CVE-2023-52707", url: "https://bugzilla.suse.com/1225190", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2023-52707", }, { cve: "CVE-2023-52708", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52708", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: mmc_spi: fix error handling in mmc_spi_probe()\n\nIf mmc_add_host() fails, it doesn't need to call mmc_remove_host(),\nor it will cause null-ptr-deref, because of deleting a not added\ndevice in mmc_remove_host().\n\nTo fix this, goto label 'fail_glue_init', if mmc_add_host() fails,\nand change the label 'fail_add_host' to 'fail_gpiod_request'.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52708", url: "https://www.suse.com/security/cve/CVE-2023-52708", }, { category: "external", summary: "SUSE Bug 1225483 for CVE-2023-52708", url: "https://bugzilla.suse.com/1225483", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52708", }, { cve: "CVE-2023-52730", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52730", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdio: fix possible resource leaks in some error paths\n\nIf sdio_add_func() or sdio_init_func() fails, sdio_remove_func() can\nnot release the resources, because the sdio function is not presented\nin these two cases, it won't call of_node_put() or put_device().\n\nTo fix these leaks, make sdio_func_present() only control whether\ndevice_del() needs to be called or not, then always call of_node_put()\nand put_device().\n\nIn error case in sdio_init_func(), the reference of 'card->dev' is\nnot get, to avoid redundant put in sdio_free_func_cis(), move the\nget_device() to sdio_alloc_func() and put_device() to sdio_release_func(),\nit can keep the get/put function be balanced.\n\nWithout this patch, while doing fault inject test, it can get the\nfollowing leak reports, after this fix, the leak is gone.\n\nunreferenced object 0xffff888112514000 (size 2048):\n comm \"kworker/3:2\", pid 65, jiffies 4294741614 (age 124.774s)\n hex dump (first 32 bytes):\n 00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 88 ff ff ..o.....`X......\n 10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff .@Q......@Q.....\n backtrace:\n [<000000009e5931da>] kmalloc_trace+0x21/0x110\n [<000000002f839ccb>] mmc_alloc_card+0x38/0xb0 [mmc_core]\n [<0000000004adcbf6>] mmc_sdio_init_card+0xde/0x170 [mmc_core]\n [<000000007538fea0>] mmc_attach_sdio+0xcb/0x1b0 [mmc_core]\n [<00000000d4fdeba7>] mmc_rescan+0x54a/0x640 [mmc_core]\n\nunreferenced object 0xffff888112511000 (size 2048):\n comm \"kworker/3:2\", pid 65, jiffies 4294741623 (age 124.766s)\n hex dump (first 32 bytes):\n 00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff .@Q......X......\n 10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff ..Q.......Q.....\n backtrace:\n [<000000009e5931da>] kmalloc_trace+0x21/0x110\n [<00000000fcbe706c>] sdio_alloc_func+0x35/0x100 [mmc_core]\n [<00000000c68f4b50>] mmc_attach_sdio.cold.18+0xb1/0x395 [mmc_core]\n [<00000000d4fdeba7>] mmc_rescan+0x54a/0x640 [mmc_core]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52730", url: "https://www.suse.com/security/cve/CVE-2023-52730", }, { category: "external", summary: "SUSE Bug 1224956 for CVE-2023-52730", url: "https://bugzilla.suse.com/1224956", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52730", }, { cve: "CVE-2023-52731", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52731", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: Fix invalid page access after closing deferred I/O devices\n\nWhen a fbdev with deferred I/O is once opened and closed, the dirty\npages still remain queued in the pageref list, and eventually later\nthose may be processed in the delayed work. This may lead to a\ncorruption of pages, hitting an Oops.\n\nThis patch makes sure to cancel the delayed work and clean up the\npageref list at closing the device for addressing the bug. A part of\nthe cleanup code is factored out as a new helper function that is\ncalled from the common fb_release().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52731", url: "https://www.suse.com/security/cve/CVE-2023-52731", }, { category: "external", summary: "SUSE Bug 1224929 for CVE-2023-52731", url: "https://bugzilla.suse.com/1224929", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52731", }, { cve: "CVE-2023-52732", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52732", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: blocklist the kclient when receiving corrupted snap trace\n\nWhen received corrupted snap trace we don't know what exactly has\nhappened in MDS side. And we shouldn't continue IOs and metadatas\naccess to MDS, which may corrupt or get incorrect contents.\n\nThis patch will just block all the further IO/MDS requests\nimmediately and then evict the kclient itself.\n\nThe reason why we still need to evict the kclient just after\nblocking all the further IOs is that the MDS could revoke the caps\nfaster.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52732", url: "https://www.suse.com/security/cve/CVE-2023-52732", }, { category: "external", summary: "SUSE Bug 1225222 for CVE-2023-52732", url: "https://bugzilla.suse.com/1225222", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52732", }, { cve: "CVE-2023-52733", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52733", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/decompressor: specify __decompress() buf len to avoid overflow\n\nHistorically calls to __decompress() didn't specify \"out_len\" parameter\non many architectures including s390, expecting that no writes beyond\nuncompressed kernel image are performed. This has changed since commit\n2aa14b1ab2c4 (\"zstd: import usptream v1.5.2\") which includes zstd library\ncommit 6a7ede3dfccb (\"Reduce size of dctx by reutilizing dst buffer\n(#2751)\"). Now zstd decompression code might store literal buffer in\nthe unwritten portion of the destination buffer. Since \"out_len\" is\nnot set, it is considered to be unlimited and hence free to use for\noptimization needs. On s390 this might corrupt initrd or ipl report\nwhich are often placed right after the decompressor buffer. Luckily the\nsize of uncompressed kernel image is already known to the decompressor,\nso to avoid the problem simply specify it in the \"out_len\" parameter.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52733", url: "https://www.suse.com/security/cve/CVE-2023-52733", }, { category: "external", summary: "SUSE Bug 1225488 for CVE-2023-52733", url: "https://bugzilla.suse.com/1225488", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52733", }, { cve: "CVE-2023-52736", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52736", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: Do not unset preset when cleaning up codec\n\nSeveral functions that take part in codec's initialization and removal\nare re-used by ASoC codec drivers implementations. Drivers mimic the\nbehavior of hda_codec_driver_probe/remove() found in\nsound/pci/hda/hda_bind.c with their component->probe/remove() instead.\n\nOne of the reasons for that is the expectation of\nsnd_hda_codec_device_new() to receive a valid pointer to an instance of\nstruct snd_card. This expectation can be met only once sound card\ncomponents probing commences.\n\nAs ASoC sound card may be unbound without codec device being actually\nremoved from the system, unsetting ->preset in\nsnd_hda_codec_cleanup_for_unbind() interferes with module unload -> load\nscenario causing null-ptr-deref. Preset is assigned only once, during\ndevice/driver matching whereas ASoC codec driver's module reloading may\noccur several times throughout the lifetime of an audio stack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52736", url: "https://www.suse.com/security/cve/CVE-2023-52736", }, { category: "external", summary: "SUSE Bug 1225486 for CVE-2023-52736", url: "https://bugzilla.suse.com/1225486", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52736", }, { cve: "CVE-2023-52738", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52738", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu/fence: Fix oops due to non-matching drm_sched init/fini\n\nCurrently amdgpu calls drm_sched_fini() from the fence driver sw fini\nroutine - such function is expected to be called only after the\nrespective init function - drm_sched_init() - was executed successfully.\n\nHappens that we faced a driver probe failure in the Steam Deck\nrecently, and the function drm_sched_fini() was called even without\nits counter-part had been previously called, causing the following oops:\n\namdgpu: probe of 0000:04:00.0 failed with error -110\nBUG: kernel NULL pointer dereference, address: 0000000000000090\nPGD 0 P4D 0\nOops: 0002 [#1] PREEMPT SMP NOPTI\nCPU: 0 PID: 609 Comm: systemd-udevd Not tainted 6.2.0-rc3-gpiccoli #338\nHardware name: Valve Jupiter/Jupiter, BIOS F7A0113 11/04/2022\nRIP: 0010:drm_sched_fini+0x84/0xa0 [gpu_sched]\n[...]\nCall Trace:\n <TASK>\n amdgpu_fence_driver_sw_fini+0xc8/0xd0 [amdgpu]\n amdgpu_device_fini_sw+0x2b/0x3b0 [amdgpu]\n amdgpu_driver_release_kms+0x16/0x30 [amdgpu]\n devm_drm_dev_init_release+0x49/0x70\n [...]\n\nTo prevent that, check if the drm_sched was properly initialized for a\ngiven ring before calling its fini counter-part.\n\nNotice ideally we'd use sched.ready for that; such field is set as the latest\nthing on drm_sched_init(). But amdgpu seems to \"override\" the meaning of such\nfield - in the above oops for example, it was a GFX ring causing the crash, and\nthe sched.ready field was set to true in the ring init routine, regardless of\nthe state of the DRM scheduler. Hence, we ended-up using sched.ops as per\nChristian's suggestion [0], and also removed the no_scheduler check [1].\n\n[0] https://lore.kernel.org/amd-gfx/984ee981-2906-0eaf-ccec-9f80975cb136@amd.com/\n[1] https://lore.kernel.org/amd-gfx/cd0e2994-f85f-d837-609f-7056d5fb7231@amd.com/", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52738", url: "https://www.suse.com/security/cve/CVE-2023-52738", }, { category: "external", summary: "SUSE Bug 1225005 for CVE-2023-52738", url: "https://bugzilla.suse.com/1225005", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52738", }, { cve: "CVE-2023-52739", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52739", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nFix page corruption caused by racy check in __free_pages\n\nWhen we upgraded our kernel, we started seeing some page corruption like\nthe following consistently:\n\n BUG: Bad page state in process ganesha.nfsd pfn:1304ca\n page:0000000022261c55 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x1304ca\n flags: 0x17ffffc0000000()\n raw: 0017ffffc0000000 ffff8a513ffd4c98 ffffeee24b35ec08 0000000000000000\n raw: 0000000000000000 0000000000000001 00000000ffffff7f 0000000000000000\n page dumped because: nonzero mapcount\n CPU: 0 PID: 15567 Comm: ganesha.nfsd Kdump: loaded Tainted: P B O 5.10.158-1.nutanix.20221209.el7.x86_64 #1\n Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/05/2016\n Call Trace:\n dump_stack+0x74/0x96\n bad_page.cold+0x63/0x94\n check_new_page_bad+0x6d/0x80\n rmqueue+0x46e/0x970\n get_page_from_freelist+0xcb/0x3f0\n ? _cond_resched+0x19/0x40\n __alloc_pages_nodemask+0x164/0x300\n alloc_pages_current+0x87/0xf0\n skb_page_frag_refill+0x84/0x110\n ...\n\nSometimes, it would also show up as corruption in the free list pointer\nand cause crashes.\n\nAfter bisecting the issue, we found the issue started from commit\ne320d3012d25 (\"mm/page_alloc.c: fix freeing non-compound pages\"):\n\n\tif (put_page_testzero(page))\n\t\tfree_the_page(page, order);\n\telse if (!PageHead(page))\n\t\twhile (order-- > 0)\n\t\t\tfree_the_page(page + (1 << order), order);\n\nSo the problem is the check PageHead is racy because at this point we\nalready dropped our reference to the page. So even if we came in with\ncompound page, the page can already be freed and PageHead can return\nfalse and we will end up freeing all the tail pages causing double free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52739", url: "https://www.suse.com/security/cve/CVE-2023-52739", }, { category: "external", summary: "SUSE Bug 1225118 for CVE-2023-52739", url: "https://bugzilla.suse.com/1225118", }, { category: "external", summary: "SUSE Bug 1225119 for CVE-2023-52739", url: "https://bugzilla.suse.com/1225119", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52739", }, { cve: "CVE-2023-52740", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52740", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch\n\nThe RFI and STF security mitigation options can flip the\ninterrupt_exit_not_reentrant static branch condition concurrently with\nthe interrupt exit code which tests that branch.\n\nInterrupt exit tests this condition to set MSR[EE|RI] for exit, then\nagain in the case a soft-masked interrupt is found pending, to recover\nthe MSR so the interrupt can be replayed before attempting to exit\nagain. If the condition changes between these two tests, the MSR and irq\nsoft-mask state will become corrupted, leading to warnings and possible\ncrashes. For example, if the branch is initially true then false,\nMSR[EE] will be 0 but PACA_IRQ_HARD_DIS clear and EE may not get\nenabled, leading to warnings in irq_64.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52740", url: "https://www.suse.com/security/cve/CVE-2023-52740", }, { category: "external", summary: "SUSE Bug 1225471 for CVE-2023-52740", url: "https://bugzilla.suse.com/1225471", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52740", }, { cve: "CVE-2023-52741", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52741", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix use-after-free in rdata->read_into_pages()\n\nWhen the network status is unstable, use-after-free may occur when\nread data from the server.\n\n BUG: KASAN: use-after-free in readpages_fill_pages+0x14c/0x7e0\n\n Call Trace:\n <TASK>\n dump_stack_lvl+0x38/0x4c\n print_report+0x16f/0x4a6\n kasan_report+0xb7/0x130\n readpages_fill_pages+0x14c/0x7e0\n cifs_readv_receive+0x46d/0xa40\n cifs_demultiplex_thread+0x121c/0x1490\n kthread+0x16b/0x1a0\n ret_from_fork+0x2c/0x50\n </TASK>\n\n Allocated by task 2535:\n kasan_save_stack+0x22/0x50\n kasan_set_track+0x25/0x30\n __kasan_kmalloc+0x82/0x90\n cifs_readdata_direct_alloc+0x2c/0x110\n cifs_readdata_alloc+0x2d/0x60\n cifs_readahead+0x393/0xfe0\n read_pages+0x12f/0x470\n page_cache_ra_unbounded+0x1b1/0x240\n filemap_get_pages+0x1c8/0x9a0\n filemap_read+0x1c0/0x540\n cifs_strict_readv+0x21b/0x240\n vfs_read+0x395/0x4b0\n ksys_read+0xb8/0x150\n do_syscall_64+0x3f/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\n Freed by task 79:\n kasan_save_stack+0x22/0x50\n kasan_set_track+0x25/0x30\n kasan_save_free_info+0x2e/0x50\n __kasan_slab_free+0x10e/0x1a0\n __kmem_cache_free+0x7a/0x1a0\n cifs_readdata_release+0x49/0x60\n process_one_work+0x46c/0x760\n worker_thread+0x2a4/0x6f0\n kthread+0x16b/0x1a0\n ret_from_fork+0x2c/0x50\n\n Last potentially related work creation:\n kasan_save_stack+0x22/0x50\n __kasan_record_aux_stack+0x95/0xb0\n insert_work+0x2b/0x130\n __queue_work+0x1fe/0x660\n queue_work_on+0x4b/0x60\n smb2_readv_callback+0x396/0x800\n cifs_abort_connection+0x474/0x6a0\n cifs_reconnect+0x5cb/0xa50\n cifs_readv_from_socket.cold+0x22/0x6c\n cifs_read_page_from_socket+0xc1/0x100\n readpages_fill_pages.cold+0x2f/0x46\n cifs_readv_receive+0x46d/0xa40\n cifs_demultiplex_thread+0x121c/0x1490\n kthread+0x16b/0x1a0\n ret_from_fork+0x2c/0x50\n\nThe following function calls will cause UAF of the rdata pointer.\n\nreadpages_fill_pages\n cifs_read_page_from_socket\n cifs_readv_from_socket\n cifs_reconnect\n __cifs_reconnect\n cifs_abort_connection\n mid->callback() --> smb2_readv_callback\n queue_work(&rdata->work) # if the worker completes first,\n # the rdata is freed\n cifs_readv_complete\n kref_put\n cifs_readdata_release\n kfree(rdata)\n return rdata->... # UAF in readpages_fill_pages()\n\nSimilarly, this problem also occurs in the uncache_fill_pages().\n\nFix this by adjusts the order of condition judgment in the return\nstatement.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52741", url: "https://www.suse.com/security/cve/CVE-2023-52741", }, { category: "external", summary: "SUSE Bug 1225479 for CVE-2023-52741", url: "https://bugzilla.suse.com/1225479", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52741", }, { cve: "CVE-2023-52742", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52742", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: USB: Fix wrong-direction WARNING in plusb.c\n\nThe syzbot fuzzer detected a bug in the plusb network driver: A\nzero-length control-OUT transfer was treated as a read instead of a\nwrite. In modern kernels this error provokes a WARNING:\n\nusb 1-1: BOGUS control dir, pipe 80000280 doesn't match bRequestType c0\nWARNING: CPU: 0 PID: 4645 at drivers/usb/core/urb.c:411\nusb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411\nModules linked in:\nCPU: 1 PID: 4645 Comm: dhcpcd Not tainted\n6.2.0-rc6-syzkaller-00050-g9f266ccaa2f5 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google\n01/12/2023\nRIP: 0010:usb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411\n...\nCall Trace:\n <TASK>\n usb_start_wait_urb+0x101/0x4b0 drivers/usb/core/message.c:58\n usb_internal_control_msg drivers/usb/core/message.c:102 [inline]\n usb_control_msg+0x320/0x4a0 drivers/usb/core/message.c:153\n __usbnet_read_cmd+0xb9/0x390 drivers/net/usb/usbnet.c:2010\n usbnet_read_cmd+0x96/0xf0 drivers/net/usb/usbnet.c:2068\n pl_vendor_req drivers/net/usb/plusb.c:60 [inline]\n pl_set_QuickLink_features drivers/net/usb/plusb.c:75 [inline]\n pl_reset+0x2f/0xf0 drivers/net/usb/plusb.c:85\n usbnet_open+0xcc/0x5d0 drivers/net/usb/usbnet.c:889\n __dev_open+0x297/0x4d0 net/core/dev.c:1417\n __dev_change_flags+0x587/0x750 net/core/dev.c:8530\n dev_change_flags+0x97/0x170 net/core/dev.c:8602\n devinet_ioctl+0x15a2/0x1d70 net/ipv4/devinet.c:1147\n inet_ioctl+0x33f/0x380 net/ipv4/af_inet.c:979\n sock_do_ioctl+0xcc/0x230 net/socket.c:1169\n sock_ioctl+0x1f8/0x680 net/socket.c:1286\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:870 [inline]\n __se_sys_ioctl fs/ioctl.c:856 [inline]\n __x64_sys_ioctl+0x197/0x210 fs/ioctl.c:856\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe fix is to call usbnet_write_cmd() instead of usbnet_read_cmd() and\nremove the USB_DIR_IN flag.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52742", url: "https://www.suse.com/security/cve/CVE-2023-52742", }, { category: "external", summary: "SUSE Bug 1225482 for CVE-2023-52742", url: "https://bugzilla.suse.com/1225482", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52742", }, { cve: "CVE-2023-52743", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52743", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Do not use WQ_MEM_RECLAIM flag for workqueue\n\nWhen both ice and the irdma driver are loaded, a warning in\ncheck_flush_dependency is being triggered. This is due to ice driver\nworkqueue being allocated with the WQ_MEM_RECLAIM flag and the irdma one\nis not.\n\nAccording to kernel documentation, this flag should be set if the\nworkqueue will be involved in the kernel's memory reclamation flow.\nSince it is not, there is no need for the ice driver's WQ to have this\nflag set so remove it.\n\nExample trace:\n\n[ +0.000004] workqueue: WQ_MEM_RECLAIM ice:ice_service_task [ice] is flushing !WQ_MEM_RECLAIM infiniband:0x0\n[ +0.000139] WARNING: CPU: 0 PID: 728 at kernel/workqueue.c:2632 check_flush_dependency+0x178/0x1a0\n[ +0.000011] Modules linked in: bonding tls xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_reject_ipv4 nft_compat nft_cha\nin_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables nfnetlink bridge stp llc rfkill vfat fat intel_rapl_msr intel\n_rapl_common isst_if_common skx_edac nfit libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crct1\n0dif_pclmul crc32_pclmul ghash_clmulni_intel rapl intel_cstate rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_\ncore_mod ib_iser libiscsi scsi_transport_iscsi rdma_cm ib_cm iw_cm iTCO_wdt iTCO_vendor_support ipmi_ssif irdma mei_me ib_uverbs\nib_core intel_uncore joydev pcspkr i2c_i801 acpi_ipmi mei lpc_ich i2c_smbus intel_pch_thermal ioatdma ipmi_si acpi_power_meter\nacpi_pad xfs libcrc32c sd_mod t10_pi crc64_rocksoft crc64 sg ahci ixgbe libahci ice i40e igb crc32c_intel mdio i2c_algo_bit liba\nta dca wmi dm_mirror dm_region_hash dm_log dm_mod ipmi_devintf ipmi_msghandler fuse\n[ +0.000161] [last unloaded: bonding]\n[ +0.000006] CPU: 0 PID: 728 Comm: kworker/0:2 Tainted: G S 6.2.0-rc2_next-queue-13jan-00458-gc20aabd57164 #1\n[ +0.000006] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0010.010620200716 01/06/2020\n[ +0.000003] Workqueue: ice ice_service_task [ice]\n[ +0.000127] RIP: 0010:check_flush_dependency+0x178/0x1a0\n[ +0.000005] Code: 89 8e 02 01 e8 49 3d 40 00 49 8b 55 18 48 8d 8d d0 00 00 00 48 8d b3 d0 00 00 00 4d 89 e0 48 c7 c7 e0 3b 08\n9f e8 bb d3 07 01 <0f> 0b e9 be fe ff ff 80 3d 24 89 8e 02 00 0f 85 6b ff ff ff e9 06\n[ +0.000004] RSP: 0018:ffff88810a39f990 EFLAGS: 00010282\n[ +0.000005] RAX: 0000000000000000 RBX: ffff888141bc2400 RCX: 0000000000000000\n[ +0.000004] RDX: 0000000000000001 RSI: dffffc0000000000 RDI: ffffffffa1213a80\n[ +0.000003] RBP: ffff888194bf3400 R08: ffffed117b306112 R09: ffffed117b306112\n[ +0.000003] R10: ffff888bd983088b R11: ffffed117b306111 R12: 0000000000000000\n[ +0.000003] R13: ffff888111f84d00 R14: ffff88810a3943ac R15: ffff888194bf3400\n[ +0.000004] FS: 0000000000000000(0000) GS:ffff888bd9800000(0000) knlGS:0000000000000000\n[ +0.000003] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ +0.000003] CR2: 000056035b208b60 CR3: 000000017795e005 CR4: 00000000007706f0\n[ +0.000003] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ +0.000003] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ +0.000002] PKRU: 55555554\n[ +0.000003] Call Trace:\n[ +0.000002] <TASK>\n[ +0.000003] __flush_workqueue+0x203/0x840\n[ +0.000006] ? mutex_unlock+0x84/0xd0\n[ +0.000008] ? __pfx_mutex_unlock+0x10/0x10\n[ +0.000004] ? __pfx___flush_workqueue+0x10/0x10\n[ +0.000006] ? mutex_lock+0xa3/0xf0\n[ +0.000005] ib_cache_cleanup_one+0x39/0x190 [ib_core]\n[ +0.000174] __ib_unregister_device+0x84/0xf0 [ib_core]\n[ +0.000094] ib_unregister_device+0x25/0x30 [ib_core]\n[ +0.000093] irdma_ib_unregister_device+0x97/0xc0 [irdma]\n[ +0.000064] ? __pfx_irdma_ib_unregister_device+0x10/0x10 [irdma]\n[ +0.000059] ? up_write+0x5c/0x90\n[ +0.000005] irdma_remove+0x36/0x90 [irdma]\n[ +0.000062] auxiliary_bus_remove+0x32/0x50\n[ +0.000007] device_r\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52743", url: "https://www.suse.com/security/cve/CVE-2023-52743", }, { category: "external", summary: "SUSE Bug 1225003 for CVE-2023-52743", url: "https://bugzilla.suse.com/1225003", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2023-52743", }, { cve: "CVE-2023-52744", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52744", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: Fix potential NULL-ptr-dereference\n\nin_dev_get() can return NULL which will cause a failure once idev is\ndereferenced in in_dev_for_each_ifa_rtnl(). This patch adds a\ncheck for NULL value in idev beforehand.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52744", url: "https://www.suse.com/security/cve/CVE-2023-52744", }, { category: "external", summary: "SUSE Bug 1225121 for CVE-2023-52744", url: "https://bugzilla.suse.com/1225121", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52744", }, { cve: "CVE-2023-52745", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52745", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/IPoIB: Fix legacy IPoIB due to wrong number of queues\n\nThe cited commit creates child PKEY interfaces over netlink will\nmultiple tx and rx queues, but some devices doesn't support more than 1\ntx and 1 rx queues. This causes to a crash when traffic is sent over the\nPKEY interface due to the parent having a single queue but the child\nhaving multiple queues.\n\nThis patch fixes the number of queues to 1 for legacy IPoIB at the\nearliest possible point in time.\n\nBUG: kernel NULL pointer dereference, address: 000000000000036b\nPGD 0 P4D 0\nOops: 0000 [#1] SMP\nCPU: 4 PID: 209665 Comm: python3 Not tainted 6.1.0_for_upstream_min_debug_2022_12_12_17_02 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nRIP: 0010:kmem_cache_alloc+0xcb/0x450\nCode: ce 7e 49 8b 50 08 49 83 78 10 00 4d 8b 28 0f 84 cb 02 00 00 4d 85 ed 0f 84 c2 02 00 00 41 8b 44 24 28 48 8d 4a\n01 49 8b 3c 24 <49> 8b 5c 05 00 4c 89 e8 65 48 0f c7 0f 0f 94 c0 84 c0 74 b8 41 8b\nRSP: 0018:ffff88822acbbab8 EFLAGS: 00010202\nRAX: 0000000000000070 RBX: ffff8881c28e3e00 RCX: 00000000064f8dae\nRDX: 00000000064f8dad RSI: 0000000000000a20 RDI: 0000000000030d00\nRBP: 0000000000000a20 R08: ffff8882f5d30d00 R09: ffff888104032f40\nR10: ffff88810fade828 R11: 736f6d6570736575 R12: ffff88810081c000\nR13: 00000000000002fb R14: ffffffff817fc865 R15: 0000000000000000\nFS: 00007f9324ff9700(0000) GS:ffff8882f5d00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000000000000036b CR3: 00000001125af004 CR4: 0000000000370ea0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n skb_clone+0x55/0xd0\n ip6_finish_output2+0x3fe/0x690\n ip6_finish_output+0xfa/0x310\n ip6_send_skb+0x1e/0x60\n udp_v6_send_skb+0x1e5/0x420\n udpv6_sendmsg+0xb3c/0xe60\n ? ip_mc_finish_output+0x180/0x180\n ? __switch_to_asm+0x3a/0x60\n ? __switch_to_asm+0x34/0x60\n sock_sendmsg+0x33/0x40\n __sys_sendto+0x103/0x160\n ? _copy_to_user+0x21/0x30\n ? kvm_clock_get_cycles+0xd/0x10\n ? ktime_get_ts64+0x49/0xe0\n __x64_sys_sendto+0x25/0x30\n do_syscall_64+0x3d/0x90\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\nRIP: 0033:0x7f9374f1ed14\nCode: 42 41 f8 ff 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b\n7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 68 41 f8 ff 48 8b\nRSP: 002b:00007f9324ff7bd0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c\nRAX: ffffffffffffffda RBX: 00007f9324ff7cc8 RCX: 00007f9374f1ed14\nRDX: 00000000000002fb RSI: 00007f93000052f0 RDI: 0000000000000030\nRBP: 0000000000000000 R08: 00007f9324ff7d40 R09: 000000000000001c\nR10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000\nR13: 000000012a05f200 R14: 0000000000000001 R15: 00007f9374d57bdc\n </TASK>", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52745", url: "https://www.suse.com/security/cve/CVE-2023-52745", }, { category: "external", summary: "SUSE Bug 1225032 for CVE-2023-52745", url: "https://bugzilla.suse.com/1225032", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52745", }, { cve: "CVE-2023-52746", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52746", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm/compat: prevent potential spectre v1 gadget in xfrm_xlate32_attr()\n\n int type = nla_type(nla);\n\n if (type > XFRMA_MAX) {\n return -EOPNOTSUPP;\n }\n\n@type is then used as an array index and can be used\nas a Spectre v1 gadget.\n\n if (nla_len(nla) < compat_policy[type].len) {\n\narray_index_nospec() can be used to prevent leaking\ncontent of kernel memory to malicious users.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52746", url: "https://www.suse.com/security/cve/CVE-2023-52746", }, { category: "external", summary: "SUSE Bug 1225114 for CVE-2023-52746", url: "https://bugzilla.suse.com/1225114", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2023-52746", }, { cve: "CVE-2023-52747", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52747", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Restore allocated resources on failed copyout\n\nFix a resource leak if an error occurs.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52747", url: "https://www.suse.com/security/cve/CVE-2023-52747", }, { category: "external", summary: "SUSE Bug 1224931 for CVE-2023-52747", url: "https://bugzilla.suse.com/1224931", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52747", }, { cve: "CVE-2023-52753", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52753", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Avoid NULL dereference of timing generator\n\n[Why & How]\nCheck whether assigned timing generator is NULL or not before\naccessing its funcs to prevent NULL dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52753", url: "https://www.suse.com/security/cve/CVE-2023-52753", }, { category: "external", summary: "SUSE Bug 1225478 for CVE-2023-52753", url: "https://bugzilla.suse.com/1225478", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52753", }, { cve: "CVE-2023-52754", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52754", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: imon: fix access to invalid resource for the second interface\n\nimon driver probes two USB interfaces, and at the probe of the second\ninterface, the driver assumes blindly that the first interface got\nbound with the same imon driver. It's usually true, but it's still\npossible that the first interface is bound with another driver via a\nmalformed descriptor. Then it may lead to a memory corruption, as\nspotted by syzkaller; imon driver accesses the data from drvdata as\nstruct imon_context object although it's a completely different one\nthat was assigned by another driver.\n\nThis patch adds a sanity check -- whether the first interface is\nreally bound with the imon driver or not -- for avoiding the problem\nabove at the probe time.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52754", url: "https://www.suse.com/security/cve/CVE-2023-52754", }, { category: "external", summary: "SUSE Bug 1225490 for CVE-2023-52754", url: "https://bugzilla.suse.com/1225490", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52754", }, { cve: "CVE-2023-52756", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52756", }, ], notes: [ { category: "general", text: "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52756", url: "https://www.suse.com/security/cve/CVE-2023-52756", }, { category: "external", summary: "SUSE Bug 1225461 for CVE-2023-52756", url: "https://bugzilla.suse.com/1225461", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52756", }, { cve: "CVE-2023-52757", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52757", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential deadlock when releasing mids\n\nAll release_mid() callers seem to hold a reference of @mid so there is\nno need to call kref_put(&mid->refcount, __release_mid) under\n@server->mid_lock spinlock. If they don't, then an use-after-free bug\nwould have occurred anyways.\n\nBy getting rid of such spinlock also fixes a potential deadlock as\nshown below\n\nCPU 0 CPU 1\n------------------------------------------------------------------\ncifs_demultiplex_thread() cifs_debug_data_proc_show()\n release_mid()\n spin_lock(&server->mid_lock);\n spin_lock(&cifs_tcp_ses_lock)\n\t\t\t\t spin_lock(&server->mid_lock)\n __release_mid()\n smb2_find_smb_tcon()\n spin_lock(&cifs_tcp_ses_lock) *deadlock*", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52757", url: "https://www.suse.com/security/cve/CVE-2023-52757", }, { category: "external", summary: "SUSE Bug 1225548 for CVE-2023-52757", url: "https://bugzilla.suse.com/1225548", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52757", }, { cve: "CVE-2023-52759", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52759", }, ], notes: [ { category: "general", text: "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52759", url: "https://www.suse.com/security/cve/CVE-2023-52759", }, { category: "external", summary: "SUSE Bug 1225560 for CVE-2023-52759", url: "https://bugzilla.suse.com/1225560", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52759", }, { cve: "CVE-2023-52763", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52763", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ni3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data.\n\nThe `i3c_master_bus_init` function may attach the I2C devices before the\nI3C bus initialization. In this flow, the DAT `alloc_entry`` will be used\nbefore the DAT `init`. Additionally, if the `i3c_master_bus_init` fails,\nthe DAT `cleanup` will execute before the device is detached, which will\nexecue DAT `free_entry` function. The above scenario can cause the driver\nto use DAT_data when it is NULL.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52763", url: "https://www.suse.com/security/cve/CVE-2023-52763", }, { category: "external", summary: "SUSE Bug 1225570 for CVE-2023-52763", url: "https://bugzilla.suse.com/1225570", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52763", }, { cve: "CVE-2023-52764", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52764", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: gspca: cpia1: shift-out-of-bounds in set_flicker\n\nSyzkaller reported the following issue:\nUBSAN: shift-out-of-bounds in drivers/media/usb/gspca/cpia1.c:1031:27\nshift exponent 245 is too large for 32-bit type 'int'\n\nWhen the value of the variable \"sd->params.exposure.gain\" exceeds the\nnumber of bits in an integer, a shift-out-of-bounds error is reported. It\nis triggered because the variable \"currentexp\" cannot be left-shifted by\nmore than the number of bits in an integer. In order to avoid invalid\nrange during left-shift, the conditional expression is added.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52764", url: "https://www.suse.com/security/cve/CVE-2023-52764", }, { category: "external", summary: "SUSE Bug 1225571 for CVE-2023-52764", url: "https://bugzilla.suse.com/1225571", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52764", }, { cve: "CVE-2023-52766", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52766", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ni3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler\n\nDo not loop over ring headers in hci_dma_irq_handler() that are not\nallocated and enabled in hci_dma_init(). Otherwise out of bounds access\nwill occur from rings->headers[i] access when i >= number of allocated\nring headers.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52766", url: "https://www.suse.com/security/cve/CVE-2023-52766", }, { category: "external", summary: "SUSE Bug 1230620 for CVE-2023-52766", url: "https://bugzilla.suse.com/1230620", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52766", }, { cve: "CVE-2023-52773", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52773", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: fix a NULL pointer dereference in amdgpu_dm_i2c_xfer()\n\nWhen ddc_service_construct() is called, it explicitly checks both the\nlink type and whether there is something on the link which will\ndictate whether the pin is marked as hw_supported.\n\nIf the pin isn't set or the link is not set (such as from\nunloading/reloading amdgpu in an IGT test) then fail the\namdgpu_dm_i2c_xfer() call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52773", url: "https://www.suse.com/security/cve/CVE-2023-52773", }, { category: "external", summary: "SUSE Bug 1225041 for CVE-2023-52773", url: "https://bugzilla.suse.com/1225041", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52773", }, { cve: "CVE-2023-52774", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52774", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: protect device queue against concurrent access\n\nIn dasd_profile_start() the amount of requests on the device queue are\ncounted. The access to the device queue is unprotected against\nconcurrent access. With a lot of parallel I/O, especially with alias\ndevices enabled, the device queue can change while dasd_profile_start()\nis accessing the queue. In the worst case this leads to a kernel panic\ndue to incorrect pointer accesses.\n\nFix this by taking the device lock before accessing the queue and\ncounting the requests. Additionally the check for a valid profile data\npointer can be done earlier to avoid unnecessary locking in a hot path.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52774", url: "https://www.suse.com/security/cve/CVE-2023-52774", }, { category: "external", summary: "SUSE Bug 1225572 for CVE-2023-52774", url: "https://bugzilla.suse.com/1225572", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52774", }, { cve: "CVE-2023-52777", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52777", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: fix gtk offload status event locking\n\nThe ath11k active pdevs are protected by RCU but the gtk offload status\nevent handling code calling ath11k_mac_get_arvif_by_vdev_id() was not\nmarked as a read-side critical section.\n\nMark the code in question as an RCU read-side critical section to avoid\nany potential use-after-free issues.\n\nCompile tested only.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52777", url: "https://www.suse.com/security/cve/CVE-2023-52777", }, { category: "external", summary: "SUSE Bug 1224992 for CVE-2023-52777", url: "https://bugzilla.suse.com/1224992", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52777", }, { cve: "CVE-2023-52781", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52781", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: config: fix iteration issue in 'usb_get_bos_descriptor()'\n\nThe BOS descriptor defines a root descriptor and is the base descriptor for\naccessing a family of related descriptors.\n\nFunction 'usb_get_bos_descriptor()' encounters an iteration issue when\nskipping the 'USB_DT_DEVICE_CAPABILITY' descriptor type. This results in\nthe same descriptor being read repeatedly.\n\nTo address this issue, a 'goto' statement is introduced to ensure that the\npointer and the amount read is updated correctly. This ensures that the\nfunction iterates to the next descriptor instead of reading the same\ndescriptor repeatedly.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52781", url: "https://www.suse.com/security/cve/CVE-2023-52781", }, { category: "external", summary: "SUSE Bug 1225092 for CVE-2023-52781", url: "https://bugzilla.suse.com/1225092", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52781", }, { cve: "CVE-2023-52788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52788", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ni915/perf: Fix NULL deref bugs with drm_dbg() calls\n\nWhen i915 perf interface is not available dereferencing it will lead to\nNULL dereferences.\n\nAs returning -ENOTSUPP is pretty clear return when perf interface is not\navailable.\n\n[tursulin: added stable tag]\n(cherry picked from commit 36f27350ff745bd228ab04d7845dfbffc177a889)", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52788", url: "https://www.suse.com/security/cve/CVE-2023-52788", }, { category: "external", summary: "SUSE Bug 1225106 for CVE-2023-52788", url: "https://bugzilla.suse.com/1225106", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52788", }, { cve: "CVE-2023-52789", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52789", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: vcc: Add check for kstrdup() in vcc_probe()\n\nAdd check for the return value of kstrdup() and return the error, if it\nfails in order to avoid NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52789", url: "https://www.suse.com/security/cve/CVE-2023-52789", }, { category: "external", summary: "SUSE Bug 1225180 for CVE-2023-52789", url: "https://bugzilla.suse.com/1225180", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52789", }, { cve: "CVE-2023-52791", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52791", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: core: Run atomic i2c xfer when !preemptible\n\nSince bae1d3a05a8b, i2c transfers are non-atomic if preemption is\ndisabled. However, non-atomic i2c transfers require preemption (e.g. in\nwait_for_completion() while waiting for the DMA).\n\npanic() calls preempt_disable_notrace() before calling\nemergency_restart(). Therefore, if an i2c device is used for the\nrestart, the xfer should be atomic. This avoids warnings like:\n\n[ 12.667612] WARNING: CPU: 1 PID: 1 at kernel/rcu/tree_plugin.h:318 rcu_note_context_switch+0x33c/0x6b0\n[ 12.676926] Voluntary context switch within RCU read-side critical section!\n...\n[ 12.742376] schedule_timeout from wait_for_completion_timeout+0x90/0x114\n[ 12.749179] wait_for_completion_timeout from tegra_i2c_wait_completion+0x40/0x70\n...\n[ 12.994527] atomic_notifier_call_chain from machine_restart+0x34/0x58\n[ 13.001050] machine_restart from panic+0x2a8/0x32c\n\nUse !preemptible() instead, which is basically the same check as\npre-v5.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52791", url: "https://www.suse.com/security/cve/CVE-2023-52791", }, { category: "external", summary: "SUSE Bug 1225108 for CVE-2023-52791", url: "https://bugzilla.suse.com/1225108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52791", }, { cve: "CVE-2023-52795", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52795", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost-vdpa: fix use after free in vhost_vdpa_probe()\n\nThe put_device() calls vhost_vdpa_release_dev() which calls\nida_simple_remove() and frees \"v\". So this call to\nida_simple_remove() is a use after free and a double free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52795", url: "https://www.suse.com/security/cve/CVE-2023-52795", }, { category: "external", summary: "SUSE Bug 1225085 for CVE-2023-52795", url: "https://bugzilla.suse.com/1225085", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52795", }, { cve: "CVE-2023-52796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52796", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: add ipvlan_route_v6_outbound() helper\n\nInspired by syzbot reports using a stack of multiple ipvlan devices.\n\nReduce stack size needed in ipvlan_process_v6_outbound() by moving\nthe flowi6 struct used for the route lookup in an non inlined\nhelper. ipvlan_route_v6_outbound() needs 120 bytes on the stack,\nimmediately reclaimed.\n\nAlso make sure ipvlan_process_v4_outbound() is not inlined.\n\nWe might also have to lower MAX_NEST_DEV, because only syzbot uses\nsetups with more than four stacked devices.\n\nBUG: TASK stack guard page was hit at ffffc9000e803ff8 (stack is ffffc9000e804000..ffffc9000e808000)\nstack guard page: 0000 [#1] SMP KASAN\nCPU: 0 PID: 13442 Comm: syz-executor.4 Not tainted 6.1.52-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023\nRIP: 0010:kasan_check_range+0x4/0x2a0 mm/kasan/generic.c:188\nCode: 48 01 c6 48 89 c7 e8 db 4e c1 03 31 c0 5d c3 cc 0f 0b eb 02 0f 0b b8 ea ff ff ff 5d c3 cc 00 00 cc cc 00 00 cc cc 55 48 89 e5 <41> 57 41 56 41 55 41 54 53 b0 01 48 85 f6 0f 84 a4 01 00 00 48 89\nRSP: 0018:ffffc9000e804000 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817e5bf2\nRDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff887c6568\nRBP: ffffc9000e804000 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92001d0080c\nR13: dffffc0000000000 R14: ffffffff87e6b100 R15: 0000000000000000\nFS: 00007fd0c55826c0(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffc9000e803ff8 CR3: 0000000170ef7000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n<#DF>\n</#DF>\n<TASK>\n[<ffffffff81f281d1>] __kasan_check_read+0x11/0x20 mm/kasan/shadow.c:31\n[<ffffffff817e5bf2>] instrument_atomic_read include/linux/instrumented.h:72 [inline]\n[<ffffffff817e5bf2>] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]\n[<ffffffff817e5bf2>] cpumask_test_cpu include/linux/cpumask.h:506 [inline]\n[<ffffffff817e5bf2>] cpu_online include/linux/cpumask.h:1092 [inline]\n[<ffffffff817e5bf2>] trace_lock_acquire include/trace/events/lock.h:24 [inline]\n[<ffffffff817e5bf2>] lock_acquire+0xe2/0x590 kernel/locking/lockdep.c:5632\n[<ffffffff8563221e>] rcu_lock_acquire+0x2e/0x40 include/linux/rcupdate.h:306\n[<ffffffff8561464d>] rcu_read_lock include/linux/rcupdate.h:747 [inline]\n[<ffffffff8561464d>] ip6_pol_route+0x15d/0x1440 net/ipv6/route.c:2221\n[<ffffffff85618120>] ip6_pol_route_output+0x50/0x80 net/ipv6/route.c:2606\n[<ffffffff856f65b5>] pol_lookup_func include/net/ip6_fib.h:584 [inline]\n[<ffffffff856f65b5>] fib6_rule_lookup+0x265/0x620 net/ipv6/fib6_rules.c:116\n[<ffffffff85618009>] ip6_route_output_flags_noref+0x2d9/0x3a0 net/ipv6/route.c:2638\n[<ffffffff8561821a>] ip6_route_output_flags+0xca/0x340 net/ipv6/route.c:2651\n[<ffffffff838bd5a3>] ip6_route_output include/net/ip6_route.h:100 [inline]\n[<ffffffff838bd5a3>] ipvlan_process_v6_outbound drivers/net/ipvlan/ipvlan_core.c:473 [inline]\n[<ffffffff838bd5a3>] ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:529 [inline]\n[<ffffffff838bd5a3>] ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]\n[<ffffffff838bd5a3>] ipvlan_queue_xmit+0xc33/0x1be0 drivers/net/ipvlan/ipvlan_core.c:677\n[<ffffffff838c2909>] ipvlan_start_xmit+0x49/0x100 drivers/net/ipvlan/ipvlan_main.c:229\n[<ffffffff84d03900>] netdev_start_xmit include/linux/netdevice.h:4966 [inline]\n[<ffffffff84d03900>] xmit_one net/core/dev.c:3644 [inline]\n[<ffffffff84d03900>] dev_hard_start_xmit+0x320/0x980 net/core/dev.c:3660\n[<ffffffff84d080e2>] __dev_queue_xmit+0x16b2/0x3370 net/core/dev.c:4324\n[<ffffffff855ce4cd>] dev_queue_xmit include/linux/netdevice.h:3067 [inline]\n[<ffffffff855ce4cd>] neigh_hh_output include/net/neighbour.h:529 [inline]\n[<f\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52796", url: "https://www.suse.com/security/cve/CVE-2023-52796", }, { category: "external", summary: "SUSE Bug 1224930 for CVE-2023-52796", url: "https://bugzilla.suse.com/1224930", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52796", }, { cve: "CVE-2023-52798", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52798", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: fix dfs radar event locking\n\nThe ath11k active pdevs are protected by RCU but the DFS radar event\nhandling code calling ath11k_mac_get_ar_by_pdev_id() was not marked as a\nread-side critical section.\n\nMark the code in question as an RCU read-side critical section to avoid\nany potential use-after-free issues.\n\nCompile tested only.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52798", url: "https://www.suse.com/security/cve/CVE-2023-52798", }, { category: "external", summary: "SUSE Bug 1224947 for CVE-2023-52798", url: "https://bugzilla.suse.com/1224947", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52798", }, { cve: "CVE-2023-52799", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52799", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix array-index-out-of-bounds in dbFindLeaf\n\nCurrently while searching for dmtree_t for sufficient free blocks there\nis an array out of bounds while getting element in tp->dm_stree. To add\nthe required check for out of bound we first need to determine the type\nof dmtree. Thus added an extra parameter to dbFindLeaf so that the type\nof tree can be determined and the required check can be applied.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52799", url: "https://www.suse.com/security/cve/CVE-2023-52799", }, { category: "external", summary: "SUSE Bug 1225472 for CVE-2023-52799", url: "https://bugzilla.suse.com/1225472", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52799", }, { cve: "CVE-2023-52800", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52800", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: fix htt pktlog locking\n\nThe ath11k active pdevs are protected by RCU but the htt pktlog handling\ncode calling ath11k_mac_get_ar_by_pdev_id() was not marked as a\nread-side critical section.\n\nMark the code in question as an RCU read-side critical section to avoid\nany potential use-after-free issues.\n\nCompile tested only.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52800", url: "https://www.suse.com/security/cve/CVE-2023-52800", }, { category: "external", summary: "SUSE Bug 1230600 for CVE-2023-52800", url: "https://bugzilla.suse.com/1230600", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52800", }, { cve: "CVE-2023-52803", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52803", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix RPC client cleaned up the freed pipefs dentries\n\nRPC client pipefs dentries cleanup is in separated rpc_remove_pipedir()\nworkqueue,which takes care about pipefs superblock locking.\nIn some special scenarios, when kernel frees the pipefs sb of the\ncurrent client and immediately alloctes a new pipefs sb,\nrpc_remove_pipedir function would misjudge the existence of pipefs\nsb which is not the one it used to hold. As a result,\nthe rpc_remove_pipedir would clean the released freed pipefs dentries.\n\nTo fix this issue, rpc_remove_pipedir should check whether the\ncurrent pipefs sb is consistent with the original pipefs sb.\n\nThis error can be catched by KASAN:\n=========================================================\n[ 250.497700] BUG: KASAN: slab-use-after-free in dget_parent+0x195/0x200\n[ 250.498315] Read of size 4 at addr ffff88800a2ab804 by task kworker/0:18/106503\n[ 250.500549] Workqueue: events rpc_free_client_work\n[ 250.501001] Call Trace:\n[ 250.502880] kasan_report+0xb6/0xf0\n[ 250.503209] ? dget_parent+0x195/0x200\n[ 250.503561] dget_parent+0x195/0x200\n[ 250.503897] ? __pfx_rpc_clntdir_depopulate+0x10/0x10\n[ 250.504384] rpc_rmdir_depopulate+0x1b/0x90\n[ 250.504781] rpc_remove_client_dir+0xf5/0x150\n[ 250.505195] rpc_free_client_work+0xe4/0x230\n[ 250.505598] process_one_work+0x8ee/0x13b0\n...\n[ 22.039056] Allocated by task 244:\n[ 22.039390] kasan_save_stack+0x22/0x50\n[ 22.039758] kasan_set_track+0x25/0x30\n[ 22.040109] __kasan_slab_alloc+0x59/0x70\n[ 22.040487] kmem_cache_alloc_lru+0xf0/0x240\n[ 22.040889] __d_alloc+0x31/0x8e0\n[ 22.041207] d_alloc+0x44/0x1f0\n[ 22.041514] __rpc_lookup_create_exclusive+0x11c/0x140\n[ 22.041987] rpc_mkdir_populate.constprop.0+0x5f/0x110\n[ 22.042459] rpc_create_client_dir+0x34/0x150\n[ 22.042874] rpc_setup_pipedir_sb+0x102/0x1c0\n[ 22.043284] rpc_client_register+0x136/0x4e0\n[ 22.043689] rpc_new_client+0x911/0x1020\n[ 22.044057] rpc_create_xprt+0xcb/0x370\n[ 22.044417] rpc_create+0x36b/0x6c0\n...\n[ 22.049524] Freed by task 0:\n[ 22.049803] kasan_save_stack+0x22/0x50\n[ 22.050165] kasan_set_track+0x25/0x30\n[ 22.050520] kasan_save_free_info+0x2b/0x50\n[ 22.050921] __kasan_slab_free+0x10e/0x1a0\n[ 22.051306] kmem_cache_free+0xa5/0x390\n[ 22.051667] rcu_core+0x62c/0x1930\n[ 22.051995] __do_softirq+0x165/0x52a\n[ 22.052347]\n[ 22.052503] Last potentially related work creation:\n[ 22.052952] kasan_save_stack+0x22/0x50\n[ 22.053313] __kasan_record_aux_stack+0x8e/0xa0\n[ 22.053739] __call_rcu_common.constprop.0+0x6b/0x8b0\n[ 22.054209] dentry_free+0xb2/0x140\n[ 22.054540] __dentry_kill+0x3be/0x540\n[ 22.054900] shrink_dentry_list+0x199/0x510\n[ 22.055293] shrink_dcache_parent+0x190/0x240\n[ 22.055703] do_one_tree+0x11/0x40\n[ 22.056028] shrink_dcache_for_umount+0x61/0x140\n[ 22.056461] generic_shutdown_super+0x70/0x590\n[ 22.056879] kill_anon_super+0x3a/0x60\n[ 22.057234] rpc_kill_sb+0x121/0x200", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52803", url: "https://www.suse.com/security/cve/CVE-2023-52803", }, { category: "external", summary: "SUSE Bug 1225008 for CVE-2023-52803", url: "https://bugzilla.suse.com/1225008", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52803", }, { cve: "CVE-2023-52804", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52804", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/jfs: Add validity check for db_maxag and db_agpref\n\nBoth db_maxag and db_agpref are used as the index of the\ndb_agfree array, but there is currently no validity check for\ndb_maxag and db_agpref, which can lead to errors.\n\nThe following is related bug reported by Syzbot:\n\nUBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:639:20\nindex 7936 is out of range for type 'atomic_t[128]'\n\nAdd checking that the values of db_maxag and db_agpref are valid\nindexes for the db_agfree array.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52804", url: "https://www.suse.com/security/cve/CVE-2023-52804", }, { category: "external", summary: "SUSE Bug 1225550 for CVE-2023-52804", url: "https://bugzilla.suse.com/1225550", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52804", }, { cve: "CVE-2023-52805", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52805", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix array-index-out-of-bounds in diAlloc\n\nCurrently there is not check against the agno of the iag while\nallocating new inodes to avoid fragmentation problem. Added the check\nwhich is required.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52805", url: "https://www.suse.com/security/cve/CVE-2023-52805", }, { category: "external", summary: "SUSE Bug 1225553 for CVE-2023-52805", url: "https://bugzilla.suse.com/1225553", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52805", }, { cve: "CVE-2023-52806", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52806", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: Fix possible null-ptr-deref when assigning a stream\n\nWhile AudioDSP drivers assign streams exclusively of HOST or LINK type,\nnothing blocks a user to attempt to assign a COUPLED stream. As\nsupplied substream instance may be a stub, what is the case when\ncode-loading, such scenario ends with null-ptr-deref.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52806", url: "https://www.suse.com/security/cve/CVE-2023-52806", }, { category: "external", summary: "SUSE Bug 1225554 for CVE-2023-52806", url: "https://bugzilla.suse.com/1225554", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52806", }, { cve: "CVE-2023-52807", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52807", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: fix out-of-bounds access may occur when coalesce info is read via debugfs\n\nThe hns3 driver define an array of string to show the coalesce\ninfo, but if the kernel adds a new mode or a new state,\nout-of-bounds access may occur when coalesce info is read via\ndebugfs, this patch fix the problem.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52807", url: "https://www.suse.com/security/cve/CVE-2023-52807", }, { category: "external", summary: "SUSE Bug 1225097 for CVE-2023-52807", url: "https://bugzilla.suse.com/1225097", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52807", }, { cve: "CVE-2023-52808", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52808", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs\n\nIf init debugfs failed during device registration due to memory allocation\nfailure, debugfs_remove_recursive() is called, after which debugfs_dir is\nnot set to NULL. debugfs_remove_recursive() will be called again during\ndevice removal. As a result, illegal pointer is accessed.\n\n[ 1665.467244] hisi_sas_v3_hw 0000:b4:02.0: failed to init debugfs!\n...\n[ 1669.836708] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a0\n[ 1669.872669] pc : down_write+0x24/0x70\n[ 1669.876315] lr : down_write+0x1c/0x70\n[ 1669.879961] sp : ffff000036f53a30\n[ 1669.883260] x29: ffff000036f53a30 x28: ffffa027c31549f8\n[ 1669.888547] x27: ffffa027c3140000 x26: 0000000000000000\n[ 1669.893834] x25: ffffa027bf37c270 x24: ffffa027bf37c270\n[ 1669.899122] x23: ffff0000095406b8 x22: ffff0000095406a8\n[ 1669.904408] x21: 0000000000000000 x20: ffffa027bf37c310\n[ 1669.909695] x19: 00000000000000a0 x18: ffff8027dcd86f10\n[ 1669.914982] x17: 0000000000000000 x16: 0000000000000000\n[ 1669.920268] x15: 0000000000000000 x14: ffffa0274014f870\n[ 1669.925555] x13: 0000000000000040 x12: 0000000000000228\n[ 1669.930842] x11: 0000000000000020 x10: 0000000000000bb0\n[ 1669.936129] x9 : ffff000036f537f0 x8 : ffff80273088ca10\n[ 1669.941416] x7 : 000000000000001d x6 : 00000000ffffffff\n[ 1669.946702] x5 : ffff000008a36310 x4 : ffff80273088be00\n[ 1669.951989] x3 : ffff000009513e90 x2 : 0000000000000000\n[ 1669.957276] x1 : 00000000000000a0 x0 : ffffffff00000001\n[ 1669.962563] Call trace:\n[ 1669.965000] down_write+0x24/0x70\n[ 1669.968301] debugfs_remove_recursive+0x5c/0x1b0\n[ 1669.972905] hisi_sas_debugfs_exit+0x24/0x30 [hisi_sas_main]\n[ 1669.978541] hisi_sas_v3_remove+0x130/0x150 [hisi_sas_v3_hw]\n[ 1669.984175] pci_device_remove+0x48/0xd8\n[ 1669.988082] device_release_driver_internal+0x1b4/0x250\n[ 1669.993282] device_release_driver+0x28/0x38\n[ 1669.997534] pci_stop_bus_device+0x84/0xb8\n[ 1670.001611] pci_stop_and_remove_bus_device_locked+0x24/0x40\n[ 1670.007244] remove_store+0xfc/0x140\n[ 1670.010802] dev_attr_store+0x44/0x60\n[ 1670.014448] sysfs_kf_write+0x58/0x80\n[ 1670.018095] kernfs_fop_write+0xe8/0x1f0\n[ 1670.022000] __vfs_write+0x60/0x190\n[ 1670.025472] vfs_write+0xac/0x1c0\n[ 1670.028771] ksys_write+0x6c/0xd8\n[ 1670.032071] __arm64_sys_write+0x24/0x30\n[ 1670.035977] el0_svc_common+0x78/0x130\n[ 1670.039710] el0_svc_handler+0x38/0x78\n[ 1670.043442] el0_svc+0x8/0xc\n\nTo fix this, set debugfs_dir to NULL after debugfs_remove_recursive().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52808", url: "https://www.suse.com/security/cve/CVE-2023-52808", }, { category: "external", summary: "SUSE Bug 1225555 for CVE-2023-52808", url: "https://bugzilla.suse.com/1225555", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52808", }, { cve: "CVE-2023-52809", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52809", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()\n\nfc_lport_ptp_setup() did not check the return value of fc_rport_create()\nwhich can return NULL and would cause a NULL pointer dereference. Address\nthis issue by checking return value of fc_rport_create() and log error\nmessage on fc_rport_create() failed.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52809", url: "https://www.suse.com/security/cve/CVE-2023-52809", }, { category: "external", summary: "SUSE Bug 1225556 for CVE-2023-52809", url: "https://bugzilla.suse.com/1225556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52809", }, { cve: "CVE-2023-52810", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52810", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/jfs: Add check for negative db_l2nbperpage\n\nl2nbperpage is log2(number of blks per page), and the minimum legal\nvalue should be 0, not negative.\n\nIn the case of l2nbperpage being negative, an error will occur\nwhen subsequently used as shift exponent.\n\nSyzbot reported this bug:\n\nUBSAN: shift-out-of-bounds in fs/jfs/jfs_dmap.c:799:12\nshift exponent -16777216 is negative", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52810", url: "https://www.suse.com/security/cve/CVE-2023-52810", }, { category: "external", summary: "SUSE Bug 1225557 for CVE-2023-52810", url: "https://bugzilla.suse.com/1225557", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52810", }, { cve: "CVE-2023-52811", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52811", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ibmvfc: Remove BUG_ON in the case of an empty event pool\n\nIn practice the driver should never send more commands than are allocated\nto a queue's event pool. In the unlikely event that this happens, the code\nasserts a BUG_ON, and in the case that the kernel is not configured to\ncrash on panic returns a junk event pointer from the empty event list\ncausing things to spiral from there. This BUG_ON is a historical artifact\nof the ibmvfc driver first being upstreamed, and it is well known now that\nthe use of BUG_ON is bad practice except in the most unrecoverable\nscenario. There is nothing about this scenario that prevents the driver\nfrom recovering and carrying on.\n\nRemove the BUG_ON in question from ibmvfc_get_event() and return a NULL\npointer in the case of an empty event pool. Update all call sites to\nibmvfc_get_event() to check for a NULL pointer and perfrom the appropriate\nfailure or recovery action.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52811", url: "https://www.suse.com/security/cve/CVE-2023-52811", }, { category: "external", summary: "SUSE Bug 1225559 for CVE-2023-52811", url: "https://bugzilla.suse.com/1225559", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52811", }, { cve: "CVE-2023-52814", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52814", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix potential null pointer derefernce\n\nThe amdgpu_ras_get_context may return NULL if device\nnot support ras feature, so add check before using.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52814", url: "https://www.suse.com/security/cve/CVE-2023-52814", }, { category: "external", summary: "SUSE Bug 1225565 for CVE-2023-52814", url: "https://bugzilla.suse.com/1225565", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52814", }, { cve: "CVE-2023-52815", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52815", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu/vkms: fix a possible null pointer dereference\n\nIn amdgpu_vkms_conn_get_modes(), the return value of drm_cvt_mode()\nis assigned to mode, which will lead to a NULL pointer dereference\non failure of drm_cvt_mode(). Add a check to avoid null pointer\ndereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52815", url: "https://www.suse.com/security/cve/CVE-2023-52815", }, { category: "external", summary: "SUSE Bug 1225568 for CVE-2023-52815", url: "https://bugzilla.suse.com/1225568", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52815", }, { cve: "CVE-2023-52816", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52816", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: Fix shift out-of-bounds issue\n\n[ 567.613292] shift exponent 255 is too large for 64-bit type 'long unsigned int'\n[ 567.614498] CPU: 5 PID: 238 Comm: kworker/5:1 Tainted: G OE 6.2.0-34-generic #34~22.04.1-Ubuntu\n[ 567.614502] Hardware name: AMD Splinter/Splinter-RPL, BIOS WS43927N_871 09/25/2023\n[ 567.614504] Workqueue: events send_exception_work_handler [amdgpu]\n[ 567.614748] Call Trace:\n[ 567.614750] <TASK>\n[ 567.614753] dump_stack_lvl+0x48/0x70\n[ 567.614761] dump_stack+0x10/0x20\n[ 567.614763] __ubsan_handle_shift_out_of_bounds+0x156/0x310\n[ 567.614769] ? srso_alias_return_thunk+0x5/0x7f\n[ 567.614773] ? update_sd_lb_stats.constprop.0+0xf2/0x3c0\n[ 567.614780] svm_range_split_by_granularity.cold+0x2b/0x34 [amdgpu]\n[ 567.615047] ? srso_alias_return_thunk+0x5/0x7f\n[ 567.615052] svm_migrate_to_ram+0x185/0x4d0 [amdgpu]\n[ 567.615286] do_swap_page+0x7b6/0xa30\n[ 567.615291] ? srso_alias_return_thunk+0x5/0x7f\n[ 567.615294] ? __free_pages+0x119/0x130\n[ 567.615299] handle_pte_fault+0x227/0x280\n[ 567.615303] __handle_mm_fault+0x3c0/0x720\n[ 567.615311] handle_mm_fault+0x119/0x330\n[ 567.615314] ? lock_mm_and_find_vma+0x44/0x250\n[ 567.615318] do_user_addr_fault+0x1a9/0x640\n[ 567.615323] exc_page_fault+0x81/0x1b0\n[ 567.615328] asm_exc_page_fault+0x27/0x30\n[ 567.615332] RIP: 0010:__get_user_8+0x1c/0x30", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52816", url: "https://www.suse.com/security/cve/CVE-2023-52816", }, { category: "external", summary: "SUSE Bug 1225529 for CVE-2023-52816", url: "https://bugzilla.suse.com/1225529", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52816", }, { cve: "CVE-2023-52817", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52817", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL\n\nIn certain types of chips, such as VEGA20, reading the amdgpu_regs_smc file could result in an abnormal null pointer access when the smc_rreg pointer is NULL. Below are the steps to reproduce this issue and the corresponding exception log:\n\n1. Navigate to the directory: /sys/kernel/debug/dri/0\n2. Execute command: cat amdgpu_regs_smc\n3. Exception Log::\n[4005007.702554] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[4005007.702562] #PF: supervisor instruction fetch in kernel mode\n[4005007.702567] #PF: error_code(0x0010) - not-present page\n[4005007.702570] PGD 0 P4D 0\n[4005007.702576] Oops: 0010 [#1] SMP NOPTI\n[4005007.702581] CPU: 4 PID: 62563 Comm: cat Tainted: G OE 5.15.0-43-generic #46-Ubunt u\n[4005007.702590] RIP: 0010:0x0\n[4005007.702598] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.\n[4005007.702600] RSP: 0018:ffffa82b46d27da0 EFLAGS: 00010206\n[4005007.702605] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffa82b46d27e68\n[4005007.702609] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff9940656e0000\n[4005007.702612] RBP: ffffa82b46d27dd8 R08: 0000000000000000 R09: ffff994060c07980\n[4005007.702615] R10: 0000000000020000 R11: 0000000000000000 R12: 00007f5e06753000\n[4005007.702618] R13: ffff9940656e0000 R14: ffffa82b46d27e68 R15: 00007f5e06753000\n[4005007.702622] FS: 00007f5e0755b740(0000) GS:ffff99479d300000(0000) knlGS:0000000000000000\n[4005007.702626] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[4005007.702629] CR2: ffffffffffffffd6 CR3: 00000003253fc000 CR4: 00000000003506e0\n[4005007.702633] Call Trace:\n[4005007.702636] <TASK>\n[4005007.702640] amdgpu_debugfs_regs_smc_read+0xb0/0x120 [amdgpu]\n[4005007.703002] full_proxy_read+0x5c/0x80\n[4005007.703011] vfs_read+0x9f/0x1a0\n[4005007.703019] ksys_read+0x67/0xe0\n[4005007.703023] __x64_sys_read+0x19/0x20\n[4005007.703028] do_syscall_64+0x5c/0xc0\n[4005007.703034] ? do_user_addr_fault+0x1e3/0x670\n[4005007.703040] ? exit_to_user_mode_prepare+0x37/0xb0\n[4005007.703047] ? irqentry_exit_to_user_mode+0x9/0x20\n[4005007.703052] ? irqentry_exit+0x19/0x30\n[4005007.703057] ? exc_page_fault+0x89/0x160\n[4005007.703062] ? asm_exc_page_fault+0x8/0x30\n[4005007.703068] entry_SYSCALL_64_after_hwframe+0x44/0xae\n[4005007.703075] RIP: 0033:0x7f5e07672992\n[4005007.703079] Code: c0 e9 b2 fe ff ff 50 48 8d 3d fa b2 0c 00 e8 c5 1d 02 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 e c 28 48 89 54 24\n[4005007.703083] RSP: 002b:00007ffe03097898 EFLAGS: 00000246 ORIG_RAX: 0000000000000000\n[4005007.703088] RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007f5e07672992\n[4005007.703091] RDX: 0000000000020000 RSI: 00007f5e06753000 RDI: 0000000000000003\n[4005007.703094] RBP: 00007f5e06753000 R08: 00007f5e06752010 R09: 00007f5e06752010\n[4005007.703096] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000022000\n[4005007.703099] R13: 0000000000000003 R14: 0000000000020000 R15: 0000000000020000\n[4005007.703105] </TASK>\n[4005007.703107] Modules linked in: nf_tables libcrc32c nfnetlink algif_hash af_alg binfmt_misc nls_ iso8859_1 ipmi_ssif ast intel_rapl_msr intel_rapl_common drm_vram_helper drm_ttm_helper amd64_edac t tm edac_mce_amd kvm_amd ccp mac_hid k10temp kvm acpi_ipmi ipmi_si rapl sch_fq_codel ipmi_devintf ipm i_msghandler msr parport_pc ppdev lp parport mtd pstore_blk efi_pstore ramoops pstore_zone reed_solo mon ip_tables x_tables autofs4 ib_uverbs ib_core amdgpu(OE) amddrm_ttm_helper(OE) amdttm(OE) iommu_v 2 amd_sched(OE) amdkcl(OE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops cec rc_core drm igb ahci xhci_pci libahci i2c_piix4 i2c_algo_bit xhci_pci_renesas dca\n[4005007.703184] CR2: 0000000000000000\n[4005007.703188] ---[ en\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52817", url: "https://www.suse.com/security/cve/CVE-2023-52817", }, { category: "external", summary: "SUSE Bug 1225569 for CVE-2023-52817", url: "https://bugzilla.suse.com/1225569", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52817", }, { cve: "CVE-2023-52818", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52818", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd: Fix UBSAN array-index-out-of-bounds for SMU7\n\nFor pptable structs that use flexible array sizes, use flexible arrays.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52818", url: "https://www.suse.com/security/cve/CVE-2023-52818", }, { category: "external", summary: "SUSE Bug 1225530 for CVE-2023-52818", url: "https://bugzilla.suse.com/1225530", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52818", }, { cve: "CVE-2023-52819", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52819", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga\n\nFor pptable structs that use flexible array sizes, use flexible arrays.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52819", url: "https://www.suse.com/security/cve/CVE-2023-52819", }, { category: "external", summary: "SUSE Bug 1225532 for CVE-2023-52819", url: "https://bugzilla.suse.com/1225532", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52819", }, { cve: "CVE-2023-52821", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52821", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panel: fix a possible null pointer dereference\n\nIn versatile_panel_get_modes(), the return value of drm_mode_duplicate()\nis assigned to mode, which will lead to a NULL pointer dereference\non failure of drm_mode_duplicate(). Add a check to avoid npd.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52821", url: "https://www.suse.com/security/cve/CVE-2023-52821", }, { category: "external", summary: "SUSE Bug 1225022 for CVE-2023-52821", url: "https://bugzilla.suse.com/1225022", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52821", }, { cve: "CVE-2023-52825", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52825", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: Fix a race condition of vram buffer unref in svm code\n\nprange->svm_bo unref can happen in both mmu callback and a callback after\nmigrate to system ram. Both are async call in different tasks. Sync svm_bo\nunref operation to avoid random \"use-after-free\".", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52825", url: "https://www.suse.com/security/cve/CVE-2023-52825", }, { category: "external", summary: "SUSE Bug 1225076 for CVE-2023-52825", url: "https://bugzilla.suse.com/1225076", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52825", }, { cve: "CVE-2023-52826", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52826", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panel/panel-tpo-tpg110: fix a possible null pointer dereference\n\nIn tpg110_get_modes(), the return value of drm_mode_duplicate() is\nassigned to mode, which will lead to a NULL pointer dereference on\nfailure of drm_mode_duplicate(). Add a check to avoid npd.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52826", url: "https://www.suse.com/security/cve/CVE-2023-52826", }, { category: "external", summary: "SUSE Bug 1225077 for CVE-2023-52826", url: "https://bugzilla.suse.com/1225077", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52826", }, { cve: "CVE-2023-52832", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52832", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: don't return unset power in ieee80211_get_tx_power()\n\nWe can get a UBSAN warning if ieee80211_get_tx_power() returns the\nINT_MIN value mac80211 internally uses for \"unset power level\".\n\n UBSAN: signed-integer-overflow in net/wireless/nl80211.c:3816:5\n -2147483648 * 100 cannot be represented in type 'int'\n CPU: 0 PID: 20433 Comm: insmod Tainted: G WC OE\n Call Trace:\n dump_stack+0x74/0x92\n ubsan_epilogue+0x9/0x50\n handle_overflow+0x8d/0xd0\n __ubsan_handle_mul_overflow+0xe/0x10\n nl80211_send_iface+0x688/0x6b0 [cfg80211]\n [...]\n cfg80211_register_wdev+0x78/0xb0 [cfg80211]\n cfg80211_netdev_notifier_call+0x200/0x620 [cfg80211]\n [...]\n ieee80211_if_add+0x60e/0x8f0 [mac80211]\n ieee80211_register_hw+0xda5/0x1170 [mac80211]\n\nIn this case, simply return an error instead, to indicate\nthat no data is available.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52832", url: "https://www.suse.com/security/cve/CVE-2023-52832", }, { category: "external", summary: "SUSE Bug 1225577 for CVE-2023-52832", url: "https://bugzilla.suse.com/1225577", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52832", }, { cve: "CVE-2023-52833", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52833", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btusb: Add date->evt_skb is NULL check\n\nfix crash because of null pointers\n\n[ 6104.969662] BUG: kernel NULL pointer dereference, address: 00000000000000c8\n[ 6104.969667] #PF: supervisor read access in kernel mode\n[ 6104.969668] #PF: error_code(0x0000) - not-present page\n[ 6104.969670] PGD 0 P4D 0\n[ 6104.969673] Oops: 0000 [#1] SMP NOPTI\n[ 6104.969684] RIP: 0010:btusb_mtk_hci_wmt_sync+0x144/0x220 [btusb]\n[ 6104.969688] RSP: 0018:ffffb8d681533d48 EFLAGS: 00010246\n[ 6104.969689] RAX: 0000000000000000 RBX: ffff8ad560bb2000 RCX: 0000000000000006\n[ 6104.969691] RDX: 0000000000000000 RSI: ffffb8d681533d08 RDI: 0000000000000000\n[ 6104.969692] RBP: ffffb8d681533d70 R08: 0000000000000001 R09: 0000000000000001\n[ 6104.969694] R10: 0000000000000001 R11: 00000000fa83b2da R12: ffff8ad461d1d7c0\n[ 6104.969695] R13: 0000000000000000 R14: ffff8ad459618c18 R15: ffffb8d681533d90\n[ 6104.969697] FS: 00007f5a1cab9d40(0000) GS:ffff8ad578200000(0000) knlGS:00000\n[ 6104.969699] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 6104.969700] CR2: 00000000000000c8 CR3: 000000018620c001 CR4: 0000000000760ef0\n[ 6104.969701] PKRU: 55555554\n[ 6104.969702] Call Trace:\n[ 6104.969708] btusb_mtk_shutdown+0x44/0x80 [btusb]\n[ 6104.969732] hci_dev_do_close+0x470/0x5c0 [bluetooth]\n[ 6104.969748] hci_rfkill_set_block+0x56/0xa0 [bluetooth]\n[ 6104.969753] rfkill_set_block+0x92/0x160\n[ 6104.969755] rfkill_fop_write+0x136/0x1e0\n[ 6104.969759] __vfs_write+0x18/0x40\n[ 6104.969761] vfs_write+0xdf/0x1c0\n[ 6104.969763] ksys_write+0xb1/0xe0\n[ 6104.969765] __x64_sys_write+0x1a/0x20\n[ 6104.969769] do_syscall_64+0x51/0x180\n[ 6104.969771] entry_SYSCALL_64_after_hwframe+0x44/0xa9\n[ 6104.969773] RIP: 0033:0x7f5a21f18fef\n[ 6104.9] RSP: 002b:00007ffeefe39010 EFLAGS: 00000293 ORIG_RAX: 0000000000000001\n[ 6104.969780] RAX: ffffffffffffffda RBX: 000055c10a7560a0 RCX: 00007f5a21f18fef\n[ 6104.969781] RDX: 0000000000000008 RSI: 00007ffeefe39060 RDI: 0000000000000012\n[ 6104.969782] RBP: 00007ffeefe39060 R08: 0000000000000000 R09: 0000000000000017\n[ 6104.969784] R10: 00007ffeefe38d97 R11: 0000000000000293 R12: 0000000000000002\n[ 6104.969785] R13: 00007ffeefe39220 R14: 00007ffeefe391a0 R15: 000055c10a72acf0", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52833", url: "https://www.suse.com/security/cve/CVE-2023-52833", }, { category: "external", summary: "SUSE Bug 1225595 for CVE-2023-52833", url: "https://bugzilla.suse.com/1225595", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52833", }, { cve: "CVE-2023-52834", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52834", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\natl1c: Work around the DMA RX overflow issue\n\nThis is based on alx driver commit 881d0327db37 (\"net: alx: Work around\nthe DMA RX overflow issue\").\n\nThe alx and atl1c drivers had RX overflow error which was why a custom\nallocator was created to avoid certain addresses. The simpler workaround\nthen created for alx driver, but not for atl1c due to lack of tester.\n\nInstead of using a custom allocator, check the allocated skb address and\nuse skb_reserve() to move away from problematic 0x...fc0 address.\n\nTested on AR8131 on Acer 4540.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52834", url: "https://www.suse.com/security/cve/CVE-2023-52834", }, { category: "external", summary: "SUSE Bug 1225599 for CVE-2023-52834", url: "https://bugzilla.suse.com/1225599", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52834", }, { cve: "CVE-2023-52838", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52838", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: imsttfb: fix a resource leak in probe\n\nI've re-written the error handling but the bug is that if init_imstt()\nfails we need to call iounmap(par->cmap_regs).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52838", url: "https://www.suse.com/security/cve/CVE-2023-52838", }, { category: "external", summary: "SUSE Bug 1225031 for CVE-2023-52838", url: "https://bugzilla.suse.com/1225031", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2023-52838", }, { cve: "CVE-2023-52840", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52840", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: synaptics-rmi4 - fix use after free in rmi_unregister_function()\n\nThe put_device() calls rmi_release_function() which frees \"fn\" so the\ndereference on the next line \"fn->num_of_irqs\" is a use after free.\nMove the put_device() to the end to fix this.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52840", url: "https://www.suse.com/security/cve/CVE-2023-52840", }, { category: "external", summary: "SUSE Bug 1224928 for CVE-2023-52840", url: "https://bugzilla.suse.com/1224928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52840", }, { cve: "CVE-2023-52841", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52841", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: vidtv: mux: Add check and kfree for kstrdup\n\nAdd check for the return value of kstrdup() and return the error\nif it fails in order to avoid NULL pointer dereference.\nMoreover, use kfree() in the later error handling in order to avoid\nmemory leak.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52841", url: "https://www.suse.com/security/cve/CVE-2023-52841", }, { category: "external", summary: "SUSE Bug 1225592 for CVE-2023-52841", url: "https://bugzilla.suse.com/1225592", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52841", }, { cve: "CVE-2023-52844", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52844", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: vidtv: psi: Add check for kstrdup\n\nAdd check for the return value of kstrdup() and return the error\nif it fails in order to avoid NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52844", url: "https://www.suse.com/security/cve/CVE-2023-52844", }, { category: "external", summary: "SUSE Bug 1225590 for CVE-2023-52844", url: "https://bugzilla.suse.com/1225590", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52844", }, { cve: "CVE-2023-52847", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52847", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: bttv: fix use after free error due to btv->timeout timer\n\nThere may be some a race condition between timer function\nbttv_irq_timeout and bttv_remove. The timer is setup in\nprobe and there is no timer_delete operation in remove\nfunction. When it hit kfree btv, the function might still be\ninvoked, which will cause use after free bug.\n\nThis bug is found by static analysis, it may be false positive.\n\nFix it by adding del_timer_sync invoking to the remove function.\n\ncpu0 cpu1\n bttv_probe\n ->timer_setup\n ->bttv_set_dma\n ->mod_timer;\nbttv_remove\n ->kfree(btv);\n ->bttv_irq_timeout\n ->USE btv", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52847", url: "https://www.suse.com/security/cve/CVE-2023-52847", }, { category: "external", summary: "SUSE Bug 1225588 for CVE-2023-52847", url: "https://bugzilla.suse.com/1225588", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52847", }, { cve: "CVE-2023-52851", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52851", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/mlx5: Fix init stage error handling to avoid double free of same QP and UAF\n\nIn the unlikely event that workqueue allocation fails and returns NULL in\nmlx5_mkey_cache_init(), delete the call to\nmlx5r_umr_resource_cleanup() (which frees the QP) in\nmlx5_ib_stage_post_ib_reg_umr_init(). This will avoid attempted double\nfree of the same QP when __mlx5_ib_add() does its cleanup.\n\nResolves a splat:\n\n Syzkaller reported a UAF in ib_destroy_qp_user\n\n workqueue: Failed to create a rescuer kthread for wq \"mkey_cache\": -EINTR\n infiniband mlx5_0: mlx5_mkey_cache_init:981:(pid 1642):\n failed to create work queue\n infiniband mlx5_0: mlx5_ib_stage_post_ib_reg_umr_init:4075:(pid 1642):\n mr cache init failed -12\n ==================================================================\n BUG: KASAN: slab-use-after-free in ib_destroy_qp_user (drivers/infiniband/core/verbs.c:2073)\n Read of size 8 at addr ffff88810da310a8 by task repro_upstream/1642\n\n Call Trace:\n <TASK>\n kasan_report (mm/kasan/report.c:590)\n ib_destroy_qp_user (drivers/infiniband/core/verbs.c:2073)\n mlx5r_umr_resource_cleanup (drivers/infiniband/hw/mlx5/umr.c:198)\n __mlx5_ib_add (drivers/infiniband/hw/mlx5/main.c:4178)\n mlx5r_probe (drivers/infiniband/hw/mlx5/main.c:4402)\n ...\n </TASK>\n\n Allocated by task 1642:\n __kmalloc (./include/linux/kasan.h:198 mm/slab_common.c:1026\n mm/slab_common.c:1039)\n create_qp (./include/linux/slab.h:603 ./include/linux/slab.h:720\n ./include/rdma/ib_verbs.h:2795 drivers/infiniband/core/verbs.c:1209)\n ib_create_qp_kernel (drivers/infiniband/core/verbs.c:1347)\n mlx5r_umr_resource_init (drivers/infiniband/hw/mlx5/umr.c:164)\n mlx5_ib_stage_post_ib_reg_umr_init (drivers/infiniband/hw/mlx5/main.c:4070)\n __mlx5_ib_add (drivers/infiniband/hw/mlx5/main.c:4168)\n mlx5r_probe (drivers/infiniband/hw/mlx5/main.c:4402)\n ...\n\n Freed by task 1642:\n __kmem_cache_free (mm/slub.c:1826 mm/slub.c:3809 mm/slub.c:3822)\n ib_destroy_qp_user (drivers/infiniband/core/verbs.c:2112)\n mlx5r_umr_resource_cleanup (drivers/infiniband/hw/mlx5/umr.c:198)\n mlx5_ib_stage_post_ib_reg_umr_init (drivers/infiniband/hw/mlx5/main.c:4076\n drivers/infiniband/hw/mlx5/main.c:4065)\n __mlx5_ib_add (drivers/infiniband/hw/mlx5/main.c:4168)\n mlx5r_probe (drivers/infiniband/hw/mlx5/main.c:4402)\n ...", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52851", url: "https://www.suse.com/security/cve/CVE-2023-52851", }, { category: "external", summary: "SUSE Bug 1225587 for CVE-2023-52851", url: "https://bugzilla.suse.com/1225587", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52851", }, { cve: "CVE-2023-52853", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52853", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nhid: cp2112: Fix duplicate workqueue initialization\n\nPreviously the cp2112 driver called INIT_DELAYED_WORK within\ncp2112_gpio_irq_startup, resulting in duplicate initilizations of the\nworkqueue on subsequent IRQ startups following an initial request. This\nresulted in a warning in set_work_data in workqueue.c, as well as a rare\nNULL dereference within process_one_work in workqueue.c.\n\nInitialize the workqueue within _probe instead.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52853", url: "https://www.suse.com/security/cve/CVE-2023-52853", }, { category: "external", summary: "SUSE Bug 1224988 for CVE-2023-52853", url: "https://bugzilla.suse.com/1224988", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52853", }, { cve: "CVE-2023-52854", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52854", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\npadata: Fix refcnt handling in padata_free_shell()\n\nIn a high-load arm64 environment, the pcrypt_aead01 test in LTP can lead\nto system UAF (Use-After-Free) issues. Due to the lengthy analysis of\nthe pcrypt_aead01 function call, I'll describe the problem scenario\nusing a simplified model:\n\nSuppose there's a user of padata named `user_function` that adheres to\nthe padata requirement of calling `padata_free_shell` after `serial()`\nhas been invoked, as demonstrated in the following code:\n\n```c\nstruct request {\n struct padata_priv padata;\n struct completion *done;\n};\n\nvoid parallel(struct padata_priv *padata) {\n do_something();\n}\n\nvoid serial(struct padata_priv *padata) {\n struct request *request = container_of(padata,\n \t\t\t\tstruct request,\n\t\t\t\tpadata);\n complete(request->done);\n}\n\nvoid user_function() {\n DECLARE_COMPLETION(done)\n padata->parallel = parallel;\n padata->serial = serial;\n padata_do_parallel();\n wait_for_completion(&done);\n padata_free_shell();\n}\n```\n\nIn the corresponding padata.c file, there's the following code:\n\n```c\nstatic void padata_serial_worker(struct work_struct *serial_work) {\n ...\n cnt = 0;\n\n while (!list_empty(&local_list)) {\n ...\n padata->serial(padata);\n cnt++;\n }\n\n local_bh_enable();\n\n if (refcount_sub_and_test(cnt, &pd->refcnt))\n padata_free_pd(pd);\n}\n```\n\nBecause of the high system load and the accumulation of unexecuted\nsoftirq at this moment, `local_bh_enable()` in padata takes longer\nto execute than usual. Subsequently, when accessing `pd->refcnt`,\n`pd` has already been released by `padata_free_shell()`, resulting\nin a UAF issue with `pd->refcnt`.\n\nThe fix is straightforward: add `refcount_dec_and_test` before calling\n`padata_free_pd` in `padata_free_shell`.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52854", url: "https://www.suse.com/security/cve/CVE-2023-52854", }, { category: "external", summary: "SUSE Bug 1225584 for CVE-2023-52854", url: "https://bugzilla.suse.com/1225584", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52854", }, { cve: "CVE-2023-52855", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52855", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc2: fix possible NULL pointer dereference caused by driver concurrency\n\nIn _dwc2_hcd_urb_enqueue(), \"urb->hcpriv = NULL\" is executed without\nholding the lock \"hsotg->lock\". In _dwc2_hcd_urb_dequeue():\n\n spin_lock_irqsave(&hsotg->lock, flags);\n ...\n\tif (!urb->hcpriv) {\n\t\tdev_dbg(hsotg->dev, \"## urb->hcpriv is NULL ##\\n\");\n\t\tgoto out;\n\t}\n rc = dwc2_hcd_urb_dequeue(hsotg, urb->hcpriv); // Use urb->hcpriv\n ...\nout:\n spin_unlock_irqrestore(&hsotg->lock, flags);\n\nWhen _dwc2_hcd_urb_enqueue() and _dwc2_hcd_urb_dequeue() are\nconcurrently executed, the NULL check of \"urb->hcpriv\" can be executed\nbefore \"urb->hcpriv = NULL\". After urb->hcpriv is NULL, it can be used\nin the function call to dwc2_hcd_urb_dequeue(), which can cause a NULL\npointer dereference.\n\nThis possible bug is found by an experimental static analysis tool\ndeveloped by myself. This tool analyzes the locking APIs to extract\nfunction pairs that can be concurrently executed, and then analyzes the\ninstructions in the paired functions to identify possible concurrency\nbugs including data races and atomicity violations. The above possible\nbug is reported, when my tool analyzes the source code of Linux 6.5.\n\nTo fix this possible bug, \"urb->hcpriv = NULL\" should be executed with\nholding the lock \"hsotg->lock\". After using this patch, my tool never\nreports the possible bug, with the kernelconfiguration allyesconfig for\nx86_64. Because I have no associated hardware, I cannot test the patch\nin runtime testing, and just verify it according to the code logic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52855", url: "https://www.suse.com/security/cve/CVE-2023-52855", }, { category: "external", summary: "SUSE Bug 1225583 for CVE-2023-52855", url: "https://bugzilla.suse.com/1225583", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52855", }, { cve: "CVE-2023-52856", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52856", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/bridge: lt8912b: Fix crash on bridge detach\n\nThe lt8912b driver, in its bridge detach function, calls\ndrm_connector_unregister() and drm_connector_cleanup().\n\ndrm_connector_unregister() should be called only for connectors\nexplicitly registered with drm_connector_register(), which is not the\ncase in lt8912b.\n\nThe driver's drm_connector_funcs.destroy hook is set to\ndrm_connector_cleanup().\n\nThus the driver should not call either drm_connector_unregister() nor\ndrm_connector_cleanup() in its lt8912_bridge_detach(), as they cause a\ncrash on bridge detach:\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000000\nMem abort info:\n ESR = 0x0000000096000006\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x06: level 2 translation fault\nData abort info:\n ISV = 0, ISS = 0x00000006, ISS2 = 0x00000000\n CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\nuser pgtable: 4k pages, 48-bit VAs, pgdp=00000000858f3000\n[0000000000000000] pgd=0800000085918003, p4d=0800000085918003, pud=0800000085431003, pmd=0000000000000000\nInternal error: Oops: 0000000096000006 [#1] PREEMPT SMP\nModules linked in: tidss(-) display_connector lontium_lt8912b tc358768 panel_lvds panel_simple drm_dma_helper drm_kms_helper drm drm_panel_orientation_quirks\nCPU: 3 PID: 462 Comm: rmmod Tainted: G W 6.5.0-rc2+ #2\nHardware name: Toradex Verdin AM62 on Verdin Development Board (DT)\npstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : drm_connector_cleanup+0x78/0x2d4 [drm]\nlr : lt8912_bridge_detach+0x54/0x6c [lontium_lt8912b]\nsp : ffff800082ed3a90\nx29: ffff800082ed3a90 x28: ffff0000040c1940 x27: 0000000000000000\nx26: 0000000000000000 x25: dead000000000122 x24: dead000000000122\nx23: dead000000000100 x22: ffff000003fb6388 x21: 0000000000000000\nx20: 0000000000000000 x19: ffff000003fb6260 x18: fffffffffffe56e8\nx17: 0000000000000000 x16: 0010000000000000 x15: 0000000000000038\nx14: 0000000000000000 x13: ffff800081914b48 x12: 000000000000040e\nx11: 000000000000015a x10: ffff80008196ebb8 x9 : ffff800081914b48\nx8 : 00000000ffffefff x7 : ffff0000040c1940 x6 : ffff80007aa649d0\nx5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff80008159e008\nx2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000\nCall trace:\n drm_connector_cleanup+0x78/0x2d4 [drm]\n lt8912_bridge_detach+0x54/0x6c [lontium_lt8912b]\n drm_bridge_detach+0x44/0x84 [drm]\n drm_encoder_cleanup+0x40/0xb8 [drm]\n drmm_encoder_alloc_release+0x1c/0x30 [drm]\n drm_managed_release+0xac/0x148 [drm]\n drm_dev_put.part.0+0x88/0xb8 [drm]\n devm_drm_dev_init_release+0x14/0x24 [drm]\n devm_action_release+0x14/0x20\n release_nodes+0x5c/0x90\n devres_release_all+0x8c/0xe0\n device_unbind_cleanup+0x18/0x68\n device_release_driver_internal+0x208/0x23c\n driver_detach+0x4c/0x94\n bus_remove_driver+0x70/0xf4\n driver_unregister+0x30/0x60\n platform_driver_unregister+0x14/0x20\n tidss_platform_driver_exit+0x18/0xb2c [tidss]\n __arm64_sys_delete_module+0x1a0/0x2b4\n invoke_syscall+0x48/0x110\n el0_svc_common.constprop.0+0x60/0x10c\n do_el0_svc_compat+0x1c/0x40\n el0_svc_compat+0x40/0xac\n el0t_32_sync_handler+0xb0/0x138\n el0t_32_sync+0x194/0x198\nCode: 9104a276 f2fbd5b7 aa0203e1 91008af8 (f85c0420)", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52856", url: "https://www.suse.com/security/cve/CVE-2023-52856", }, { category: "external", summary: "SUSE Bug 1224932 for CVE-2023-52856", url: "https://bugzilla.suse.com/1224932", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52856", }, { cve: "CVE-2023-52858", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52858", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data\n\nAdd the check for the return value of mtk_alloc_clk_data() in order to\navoid NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52858", url: "https://www.suse.com/security/cve/CVE-2023-52858", }, { category: "external", summary: "SUSE Bug 1225566 for CVE-2023-52858", url: "https://bugzilla.suse.com/1225566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52858", }, { cve: "CVE-2023-52860", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52860", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers/perf: hisi: use cpuhp_state_remove_instance_nocalls() for hisi_hns3_pmu uninit process\n\nWhen tearing down a 'hisi_hns3' PMU, we mistakenly run the CPU hotplug\ncallbacks after the device has been unregistered, leading to fireworks\nwhen we try to execute empty function callbacks within the driver:\n\n | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n | CPU: 0 PID: 15 Comm: cpuhp/0 Tainted: G W O 5.12.0-rc4+ #1\n | Hardware name: , BIOS KpxxxFPGA 1P B600 V143 04/22/2021\n | pstate: 80400009 (Nzcv daif +PAN -UAO -TCO BTYPE=--)\n | pc : perf_pmu_migrate_context+0x98/0x38c\n | lr : perf_pmu_migrate_context+0x94/0x38c\n |\n | Call trace:\n | perf_pmu_migrate_context+0x98/0x38c\n | hisi_hns3_pmu_offline_cpu+0x104/0x12c [hisi_hns3_pmu]\n\nUse cpuhp_state_remove_instance_nocalls() instead of\ncpuhp_state_remove_instance() so that the notifiers don't execute after\nthe PMU device has been unregistered.\n\n[will: Rewrote commit message]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52860", url: "https://www.suse.com/security/cve/CVE-2023-52860", }, { category: "external", summary: "SUSE Bug 1224936 for CVE-2023-52860", url: "https://bugzilla.suse.com/1224936", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52860", }, { cve: "CVE-2023-52861", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52861", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: bridge: it66121: Fix invalid connector dereference\n\nFix the NULL pointer dereference when no monitor is connected, and the\nsound card is opened from userspace.\n\nInstead return an empty buffer (of zeroes) as the EDID information to\nthe sound framework if there is no connector attached.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52861", url: "https://www.suse.com/security/cve/CVE-2023-52861", }, { category: "external", summary: "SUSE Bug 1224941 for CVE-2023-52861", url: "https://bugzilla.suse.com/1224941", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52861", }, { cve: "CVE-2023-52864", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52864", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: wmi: Fix opening of char device\n\nSince commit fa1f68db6ca7 (\"drivers: misc: pass miscdevice pointer via\nfile private data\"), the miscdevice stores a pointer to itself inside\nfilp->private_data, which means that private_data will not be NULL when\nwmi_char_open() is called. This might cause memory corruption should\nwmi_char_open() be unable to find its driver, something which can\nhappen when the associated WMI device is deleted in wmi_free_devices().\n\nFix the problem by using the miscdevice pointer to retrieve the WMI\ndevice data associated with a char device using container_of(). This\nalso avoids wmi_char_open() picking a wrong WMI device bound to a\ndriver with the same name as the original driver.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52864", url: "https://www.suse.com/security/cve/CVE-2023-52864", }, { category: "external", summary: "SUSE Bug 1225132 for CVE-2023-52864", url: "https://bugzilla.suse.com/1225132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52864", }, { cve: "CVE-2023-52865", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52865", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data\n\nAdd the check for the return value of mtk_alloc_clk_data() in order to\navoid NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52865", url: "https://www.suse.com/security/cve/CVE-2023-52865", }, { category: "external", summary: "SUSE Bug 1225086 for CVE-2023-52865", url: "https://bugzilla.suse.com/1225086", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52865", }, { cve: "CVE-2023-52867", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52867", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: possible buffer overflow\n\nBuffer 'afmt_status' of size 6 could overflow, since index 'afmt_idx' is\nchecked after access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52867", url: "https://www.suse.com/security/cve/CVE-2023-52867", }, { category: "external", summary: "SUSE Bug 1225009 for CVE-2023-52867", url: "https://bugzilla.suse.com/1225009", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52867", }, { cve: "CVE-2023-52868", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52868", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal: core: prevent potential string overflow\n\nThe dev->id value comes from ida_alloc() so it's a number between zero\nand INT_MAX. If it's too high then these sprintf()s will overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52868", url: "https://www.suse.com/security/cve/CVE-2023-52868", }, { category: "external", summary: "SUSE Bug 1225044 for CVE-2023-52868", url: "https://bugzilla.suse.com/1225044", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52868", }, { cve: "CVE-2023-52870", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52870", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data\n\nAdd the check for the return value of mtk_alloc_clk_data() in order to\navoid NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52870", url: "https://www.suse.com/security/cve/CVE-2023-52870", }, { category: "external", summary: "SUSE Bug 1224937 for CVE-2023-52870", url: "https://bugzilla.suse.com/1224937", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52870", }, { cve: "CVE-2023-52871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52871", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: llcc: Handle a second device without data corruption\n\nUsually there is only one llcc device. But if there were a second, even\na failed probe call would modify the global drv_data pointer. So check\nif drv_data is valid before overwriting it.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52871", url: "https://www.suse.com/security/cve/CVE-2023-52871", }, { category: "external", summary: "SUSE Bug 1225534 for CVE-2023-52871", url: "https://bugzilla.suse.com/1225534", }, { category: "external", summary: "SUSE Bug 1227475 for CVE-2023-52871", url: "https://bugzilla.suse.com/1227475", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2023-52871", }, { cve: "CVE-2023-52872", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52872", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: fix race condition in status line change on dead connections\n\ngsm_cleanup_mux() cleans up the gsm by closing all DLCIs, stopping all\ntimers, removing the virtual tty devices and clearing the data queues.\nThis procedure, however, may cause subsequent changes of the virtual modem\nstatus lines of a DLCI. More data is being added the outgoing data queue\nand the deleted kick timer is restarted to handle this. At this point many\nresources have already been removed by the cleanup procedure. Thus, a\nkernel panic occurs.\n\nFix this by proving in gsm_modem_update() that the cleanup procedure has\nnot been started and the mux is still alive.\n\nNote that writing to a virtual tty is already protected by checks against\nthe DLCI specific connection state.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52872", url: "https://www.suse.com/security/cve/CVE-2023-52872", }, { category: "external", summary: "SUSE Bug 1225591 for CVE-2023-52872", url: "https://bugzilla.suse.com/1225591", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52872", }, { cve: "CVE-2023-52873", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52873", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data\n\nAdd the check for the return value of mtk_alloc_clk_data() in order to\navoid NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52873", url: "https://www.suse.com/security/cve/CVE-2023-52873", }, { category: "external", summary: "SUSE Bug 1225589 for CVE-2023-52873", url: "https://bugzilla.suse.com/1225589", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52873", }, { cve: "CVE-2023-52875", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52875", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data\n\nAdd the check for the return value of mtk_alloc_clk_data() in order to\navoid NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52875", url: "https://www.suse.com/security/cve/CVE-2023-52875", }, { category: "external", summary: "SUSE Bug 1225096 for CVE-2023-52875", url: "https://bugzilla.suse.com/1225096", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52875", }, { cve: "CVE-2023-52876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52876", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data\n\nAdd the check for the return value of mtk_alloc_clk_data() in order to\navoid NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52876", url: "https://www.suse.com/security/cve/CVE-2023-52876", }, { category: "external", summary: "SUSE Bug 1225036 for CVE-2023-52876", url: "https://bugzilla.suse.com/1225036", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52876", }, { cve: "CVE-2023-52877", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52877", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()\n\nIt is possible that typec_register_partner() returns ERR_PTR on failure.\nWhen port->partner is an error, a NULL pointer dereference may occur as\nshown below.\n\n[91222.095236][ T319] typec port0: failed to register partner (-17)\n...\n[91225.061491][ T319] Unable to handle kernel NULL pointer dereference\nat virtual address 000000000000039f\n[91225.274642][ T319] pc : tcpm_pd_data_request+0x310/0x13fc\n[91225.274646][ T319] lr : tcpm_pd_data_request+0x298/0x13fc\n[91225.308067][ T319] Call trace:\n[91225.308070][ T319] tcpm_pd_data_request+0x310/0x13fc\n[91225.308073][ T319] tcpm_pd_rx_handler+0x100/0x9e8\n[91225.355900][ T319] kthread_worker_fn+0x178/0x58c\n[91225.355902][ T319] kthread+0x150/0x200\n[91225.355905][ T319] ret_from_fork+0x10/0x30\n\nAdd a check for port->partner to avoid dereferencing a NULL pointer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52877", url: "https://www.suse.com/security/cve/CVE-2023-52877", }, { category: "external", summary: "SUSE Bug 1224944 for CVE-2023-52877", url: "https://bugzilla.suse.com/1224944", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52877", }, { cve: "CVE-2023-52878", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52878", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds\n\nIf the \"struct can_priv::echoo_skb\" is accessed out of bounds, this\nwould cause a kernel crash. Instead, issue a meaningful warning\nmessage and return with an error.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52878", url: "https://www.suse.com/security/cve/CVE-2023-52878", }, { category: "external", summary: "SUSE Bug 1225000 for CVE-2023-52878", url: "https://bugzilla.suse.com/1225000", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-52878", }, { cve: "CVE-2023-52880", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52880", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc\n\nAny unprivileged user can attach N_GSM0710 ldisc, but it requires\nCAP_NET_ADMIN to create a GSM network anyway.\n\nRequire initial namespace CAP_NET_ADMIN to do that.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52880", url: "https://www.suse.com/security/cve/CVE-2023-52880", }, { category: "external", summary: "SUSE Bug 1222619 for CVE-2023-52880", url: "https://bugzilla.suse.com/1222619", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2023-52880", }, { cve: "CVE-2023-6531", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6531", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the Linux Kernel due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6531", url: "https://www.suse.com/security/cve/CVE-2023-6531", }, { category: "external", summary: "SUSE Bug 1218447 for CVE-2023-6531", url: "https://bugzilla.suse.com/1218447", }, { category: "external", summary: "SUSE Bug 1218487 for CVE-2023-6531", url: "https://bugzilla.suse.com/1218487", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2023-6531", }, { cve: "CVE-2024-2201", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-2201", }, ], notes: [ { category: "general", text: "A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-2201", url: "https://www.suse.com/security/cve/CVE-2024-2201", }, { category: "external", summary: "SUSE Bug 1212111 for CVE-2024-2201", url: "https://bugzilla.suse.com/1212111", }, { category: "external", summary: "SUSE Bug 1217339 for CVE-2024-2201", url: "https://bugzilla.suse.com/1217339", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-2201", }, { cve: "CVE-2024-26597", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26597", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: qualcomm: rmnet: fix global oob in rmnet_policy\n\nThe variable rmnet_link_ops assign a *bigger* maxtype which leads to a\nglobal out-of-bounds read when parsing the netlink attributes. See bug\ntrace below:\n\n==================================================================\nBUG: KASAN: global-out-of-bounds in validate_nla lib/nlattr.c:386 [inline]\nBUG: KASAN: global-out-of-bounds in __nla_validate_parse+0x24af/0x2750 lib/nlattr.c:600\nRead of size 1 at addr ffffffff92c438d0 by task syz-executor.6/84207\n\nCPU: 0 PID: 84207 Comm: syz-executor.6 Tainted: G N 6.1.0 #3\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x8b/0xb3 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:284 [inline]\n print_report+0x172/0x475 mm/kasan/report.c:395\n kasan_report+0xbb/0x1c0 mm/kasan/report.c:495\n validate_nla lib/nlattr.c:386 [inline]\n __nla_validate_parse+0x24af/0x2750 lib/nlattr.c:600\n __nla_parse+0x3e/0x50 lib/nlattr.c:697\n nla_parse_nested_deprecated include/net/netlink.h:1248 [inline]\n __rtnl_newlink+0x50a/0x1880 net/core/rtnetlink.c:3485\n rtnl_newlink+0x64/0xa0 net/core/rtnetlink.c:3594\n rtnetlink_rcv_msg+0x43c/0xd70 net/core/rtnetlink.c:6091\n netlink_rcv_skb+0x14f/0x410 net/netlink/af_netlink.c:2540\n netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]\n netlink_unicast+0x54e/0x800 net/netlink/af_netlink.c:1345\n netlink_sendmsg+0x930/0xe50 net/netlink/af_netlink.c:1921\n sock_sendmsg_nosec net/socket.c:714 [inline]\n sock_sendmsg+0x154/0x190 net/socket.c:734\n ____sys_sendmsg+0x6df/0x840 net/socket.c:2482\n ___sys_sendmsg+0x110/0x1b0 net/socket.c:2536\n __sys_sendmsg+0xf3/0x1c0 net/socket.c:2565\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\nRIP: 0033:0x7fdcf2072359\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fdcf13e3168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\nRAX: ffffffffffffffda RBX: 00007fdcf219ff80 RCX: 00007fdcf2072359\nRDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003\nRBP: 00007fdcf20bd493 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007fffbb8d7bdf R14: 00007fdcf13e3300 R15: 0000000000022000\n </TASK>\n\nThe buggy address belongs to the variable:\n rmnet_policy+0x30/0xe0\n\nThe buggy address belongs to the physical page:\npage:0000000065bdeb3c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x155243\nflags: 0x200000000001000(reserved|node=0|zone=2)\nraw: 0200000000001000 ffffea00055490c8 ffffea00055490c8 0000000000000000\nraw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffffffff92c43780: f9 f9 f9 f9 00 00 00 02 f9 f9 f9 f9 00 00 00 07\n ffffffff92c43800: f9 f9 f9 f9 00 00 00 05 f9 f9 f9 f9 06 f9 f9 f9\n>ffffffff92c43880: f9 f9 f9 f9 00 00 00 00 00 00 f9 f9 f9 f9 f9 f9\n ^\n ffffffff92c43900: 00 00 00 00 00 00 00 00 07 f9 f9 f9 f9 f9 f9 f9\n ffffffff92c43980: 00 00 00 07 f9 f9 f9 f9 00 00 00 05 f9 f9 f9 f9\n\nAccording to the comment of `nla_parse_nested_deprecated`, the maxtype\nshould be len(destination array) - 1. Hence use `IFLA_RMNET_MAX` here.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26597", url: "https://www.suse.com/security/cve/CVE-2024-26597", }, { category: "external", summary: "SUSE Bug 1220363 for CVE-2024-26597", url: "https://bugzilla.suse.com/1220363", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-26597", }, { cve: "CVE-2024-26643", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26643", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout\n\nWhile the rhashtable set gc runs asynchronously, a race allows it to\ncollect elements from anonymous sets with timeouts while it is being\nreleased from the commit path.\n\nMingi Cho originally reported this issue in a different path in 6.1.x\nwith a pipapo set with low timeouts which is not possible upstream since\n7395dfacfff6 (\"netfilter: nf_tables: use timestamp to check for set\nelement timeout\").\n\nFix this by setting on the dead flag for anonymous sets to skip async gc\nin this case.\n\nAccording to 08e4c8c5919f (\"netfilter: nf_tables: mark newset as dead on\ntransaction abort\"), Florian plans to accelerate abort path by releasing\nobjects via workqueue, therefore, this sets on the dead flag for abort\npath too.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26643", url: "https://www.suse.com/security/cve/CVE-2024-26643", }, { category: "external", summary: "SUSE Bug 1221829 for CVE-2024-26643", url: "https://bugzilla.suse.com/1221829", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26643", }, { cve: "CVE-2024-26679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26679", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ninet: read sk->sk_family once in inet_recv_error()\n\ninet_recv_error() is called without holding the socket lock.\n\nIPv6 socket could mutate to IPv4 with IPV6_ADDRFORM\nsocket option and trigger a KCSAN warning.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26679", url: "https://www.suse.com/security/cve/CVE-2024-26679", }, { category: "external", summary: "SUSE Bug 1222385 for CVE-2024-26679", url: "https://bugzilla.suse.com/1222385", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26679", }, { cve: "CVE-2024-26692", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26692", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: Fix regression in writes when non-standard maximum write size negotiated\n\nThe conversion to netfs in the 6.3 kernel caused a regression when\nmaximum write size is set by the server to an unexpected value which is\nnot a multiple of 4096 (similarly if the user overrides the maximum\nwrite size by setting mount parm \"wsize\", but sets it to a value that\nis not a multiple of 4096). When negotiated write size is not a\nmultiple of 4096 the netfs code can skip the end of the final\npage when doing large sequential writes, causing data corruption.\n\nThis section of code is being rewritten/removed due to a large\nnetfs change, but until that point (ie for the 6.3 kernel until now)\nwe can not support non-standard maximum write sizes.\n\nAdd a warning if a user specifies a wsize on mount that is not\na multiple of 4096 (and round down), also add a change where we\nround down the maximum write size if the server negotiates a value\nthat is not a multiple of 4096 (we also have to check to make sure that\nwe do not round it down to zero).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26692", url: "https://www.suse.com/security/cve/CVE-2024-26692", }, { category: "external", summary: "SUSE Bug 1222464 for CVE-2024-26692", url: "https://bugzilla.suse.com/1222464", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26692", }, { cve: "CVE-2024-26698", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26698", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nhv_netvsc: Fix race condition between netvsc_probe and netvsc_remove\n\nIn commit ac5047671758 (\"hv_netvsc: Disable NAPI before closing the\nVMBus channel\"), napi_disable was getting called for all channels,\nincluding all subchannels without confirming if they are enabled or not.\n\nThis caused hv_netvsc getting hung at napi_disable, when netvsc_probe()\nhas finished running but nvdev->subchan_work has not started yet.\nnetvsc_subchan_work() -> rndis_set_subchannel() has not created the\nsub-channels and because of that netvsc_sc_open() is not running.\nnetvsc_remove() calls cancel_work_sync(&nvdev->subchan_work), for which\nnetvsc_subchan_work did not run.\n\nnetif_napi_add() sets the bit NAPI_STATE_SCHED because it ensures NAPI\ncannot be scheduled. Then netvsc_sc_open() -> napi_enable will clear the\nNAPIF_STATE_SCHED bit, so it can be scheduled. napi_disable() does the\nopposite.\n\nNow during netvsc_device_remove(), when napi_disable is called for those\nsubchannels, napi_disable gets stuck on infinite msleep.\n\nThis fix addresses this problem by ensuring that napi_disable() is not\ngetting called for non-enabled NAPI struct.\nBut netif_napi_del() is still necessary for these non-enabled NAPI struct\nfor cleanup purpose.\n\nCall trace:\n[ 654.559417] task:modprobe state:D stack: 0 pid: 2321 ppid: 1091 flags:0x00004002\n[ 654.568030] Call Trace:\n[ 654.571221] <TASK>\n[ 654.573790] __schedule+0x2d6/0x960\n[ 654.577733] schedule+0x69/0xf0\n[ 654.581214] schedule_timeout+0x87/0x140\n[ 654.585463] ? __bpf_trace_tick_stop+0x20/0x20\n[ 654.590291] msleep+0x2d/0x40\n[ 654.593625] napi_disable+0x2b/0x80\n[ 654.597437] netvsc_device_remove+0x8a/0x1f0 [hv_netvsc]\n[ 654.603935] rndis_filter_device_remove+0x194/0x1c0 [hv_netvsc]\n[ 654.611101] ? do_wait_intr+0xb0/0xb0\n[ 654.615753] netvsc_remove+0x7c/0x120 [hv_netvsc]\n[ 654.621675] vmbus_remove+0x27/0x40 [hv_vmbus]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26698", url: "https://www.suse.com/security/cve/CVE-2024-26698", }, { category: "external", summary: "SUSE Bug 1222374 for CVE-2024-26698", url: "https://bugzilla.suse.com/1222374", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26698", }, { cve: "CVE-2024-26700", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26700", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix MST Null Ptr for RV\n\nThe change try to fix below error specific to RV platform:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000008\nPGD 0 P4D 0\nOops: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 4 PID: 917 Comm: sway Not tainted 6.3.9-arch1-1 #1 124dc55df4f5272ccb409f39ef4872fc2b3376a2\nHardware name: LENOVO 20NKS01Y00/20NKS01Y00, BIOS R12ET61W(1.31 ) 07/28/2022\nRIP: 0010:drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper]\nCode: 01 00 00 48 8b 85 60 05 00 00 48 63 80 88 00 00 00 3b 43 28 0f 8d 2e 01 00 00 48 8b 53 30 48 8d 04 80 48 8d 04 c2 48 8b 40 18 <48> 8>\nRSP: 0018:ffff960cc2df77d8 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: ffff8afb87e81280 RCX: 0000000000000224\nRDX: ffff8afb9ee37c00 RSI: ffff8afb8da1a578 RDI: ffff8afb87e81280\nRBP: ffff8afb83d67000 R08: 0000000000000001 R09: ffff8afb9652f850\nR10: ffff960cc2df7908 R11: 0000000000000002 R12: 0000000000000000\nR13: ffff8afb8d7688a0 R14: ffff8afb8da1a578 R15: 0000000000000224\nFS: 00007f4dac35ce00(0000) GS:ffff8afe30b00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000008 CR3: 000000010ddc6000 CR4: 00000000003506e0\nCall Trace:\n <TASK>\n ? __die+0x23/0x70\n ? page_fault_oops+0x171/0x4e0\n ? plist_add+0xbe/0x100\n ? exc_page_fault+0x7c/0x180\n ? asm_exc_page_fault+0x26/0x30\n ? drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper 0e67723696438d8e02b741593dd50d80b44c2026]\n ? drm_dp_atomic_find_time_slots+0x28/0x260 [drm_display_helper 0e67723696438d8e02b741593dd50d80b44c2026]\n compute_mst_dsc_configs_for_link+0x2ff/0xa40 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]\n ? fill_plane_buffer_attributes+0x419/0x510 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]\n compute_mst_dsc_configs_for_state+0x1e1/0x250 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]\n amdgpu_dm_atomic_check+0xecd/0x1190 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]\n drm_atomic_check_only+0x5c5/0xa40\n drm_mode_atomic_ioctl+0x76e/0xbc0\n ? _copy_to_user+0x25/0x30\n ? drm_ioctl+0x296/0x4b0\n ? __pfx_drm_mode_atomic_ioctl+0x10/0x10\n drm_ioctl_kernel+0xcd/0x170\n drm_ioctl+0x26d/0x4b0\n ? __pfx_drm_mode_atomic_ioctl+0x10/0x10\n amdgpu_drm_ioctl+0x4e/0x90 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]\n __x64_sys_ioctl+0x94/0xd0\n do_syscall_64+0x60/0x90\n ? do_syscall_64+0x6c/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\nRIP: 0033:0x7f4dad17f76f\nCode: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c>\nRSP: 002b:00007ffd9ae859f0 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 000055e255a55900 RCX: 00007f4dad17f76f\nRDX: 00007ffd9ae85a90 RSI: 00000000c03864bc RDI: 000000000000000b\nRBP: 00007ffd9ae85a90 R08: 0000000000000003 R09: 0000000000000003\nR10: 0000000000000000 R11: 0000000000000246 R12: 00000000c03864bc\nR13: 000000000000000b R14: 000055e255a7fc60 R15: 000055e255a01eb0\n </TASK>\nModules linked in: rfcomm snd_seq_dummy snd_hrtimer snd_seq snd_seq_device ccm cmac algif_hash algif_skcipher af_alg joydev mousedev bnep >\n typec libphy k10temp ipmi_msghandler roles i2c_scmi acpi_cpufreq mac_hid nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_mas>\nCR2: 0000000000000008\n---[ end trace 0000000000000000 ]---\nRIP: 0010:drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper]\nCode: 01 00 00 48 8b 85 60 05 00 00 48 63 80 88 00 00 00 3b 43 28 0f 8d 2e 01 00 00 48 8b 53 30 48 8d 04 80 48 8d 04 c2 48 8b 40 18 <48> 8>\nRSP: 0018:ffff960cc2df77d8 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: ffff8afb87e81280 RCX: 0000000000000224\nRDX: ffff8afb9ee37c00 RSI: ffff8afb8da1a578 RDI: ffff8afb87e81280\nRBP: ffff8afb83d67000 R08: 0000000000000001 R09: ffff8afb9652f850\nR10: ffff960cc2df7908 R11: 0000000000000002 R12: 0000000000000000\nR13: ffff8afb8d7688a0 R14: ffff8afb8da1a578 R15: 0000000000000224\nFS: 00007f4dac35ce00(0000) GS:ffff8afe30b00000(0000\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26700", url: "https://www.suse.com/security/cve/CVE-2024-26700", }, { category: "external", summary: "SUSE Bug 1222870 for CVE-2024-26700", url: "https://bugzilla.suse.com/1222870", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26700", }, { cve: "CVE-2024-26715", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26715", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend\n\nIn current scenario if Plug-out and Plug-In performed continuously\nthere could be a chance while checking for dwc->gadget_driver in\ndwc3_gadget_suspend, a NULL pointer dereference may occur.\n\nCall Stack:\n\n\tCPU1: CPU2:\n\tgadget_unbind_driver dwc3_suspend_common\n\tdwc3_gadget_stop dwc3_gadget_suspend\n dwc3_disconnect_gadget\n\nCPU1 basically clears the variable and CPU2 checks the variable.\nConsider CPU1 is running and right before gadget_driver is cleared\nand in parallel CPU2 executes dwc3_gadget_suspend where it finds\ndwc->gadget_driver which is not NULL and resumes execution and then\nCPU1 completes execution. CPU2 executes dwc3_disconnect_gadget where\nit checks dwc->gadget_driver is already NULL because of which the\nNULL pointer deference occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26715", url: "https://www.suse.com/security/cve/CVE-2024-26715", }, { category: "external", summary: "SUSE Bug 1222561 for CVE-2024-26715", url: "https://bugzilla.suse.com/1222561", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26715", }, { cve: "CVE-2024-26739", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26739", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_mirred: don't override retval if we already lost the skb\n\nIf we're redirecting the skb, and haven't called tcf_mirred_forward(),\nyet, we need to tell the core to drop the skb by setting the retcode\nto SHOT. If we have called tcf_mirred_forward(), however, the skb\nis out of our hands and returning SHOT will lead to UaF.\n\nMove the retval override to the error path which actually need it.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26739", url: "https://www.suse.com/security/cve/CVE-2024-26739", }, { category: "external", summary: "SUSE Bug 1222559 for CVE-2024-26739", url: "https://bugzilla.suse.com/1222559", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26739", }, { cve: "CVE-2024-26742", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26742", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: smartpqi: Fix disable_managed_interrupts\n\nCorrect blk-mq registration issue with module parameter\ndisable_managed_interrupts enabled.\n\nWhen we turn off the default PCI_IRQ_AFFINITY flag, the driver needs to\nregister with blk-mq using blk_mq_map_queues(). The driver is currently\ncalling blk_mq_pci_map_queues() which results in a stack trace and possibly\nundefined behavior.\n\nStack Trace:\n[ 7.860089] scsi host2: smartpqi\n[ 7.871934] WARNING: CPU: 0 PID: 238 at block/blk-mq-pci.c:52 blk_mq_pci_map_queues+0xca/0xd0\n[ 7.889231] Modules linked in: sd_mod t10_pi sg uas smartpqi(+) crc32c_intel scsi_transport_sas usb_storage dm_mirror dm_region_hash dm_log dm_mod ipmi_devintf ipmi_msghandler fuse\n[ 7.924755] CPU: 0 PID: 238 Comm: kworker/0:3 Not tainted 4.18.0-372.88.1.el8_6_smartpqi_test.x86_64 #1\n[ 7.944336] Hardware name: HPE ProLiant DL380 Gen10/ProLiant DL380 Gen10, BIOS U30 03/08/2022\n[ 7.963026] Workqueue: events work_for_cpu_fn\n[ 7.978275] RIP: 0010:blk_mq_pci_map_queues+0xca/0xd0\n[ 7.978278] Code: 48 89 de 89 c7 e8 f6 0f 4f 00 3b 05 c4 b7 8e 01 72 e1 5b 31 c0 5d 41 5c 41 5d 41 5e 41 5f e9 7d df 73 00 31 c0 e9 76 df 73 00 <0f> 0b eb bc 90 90 0f 1f 44 00 00 41 57 49 89 ff 41 56 41 55 41 54\n[ 7.978280] RSP: 0018:ffffa95fc3707d50 EFLAGS: 00010216\n[ 7.978283] RAX: 00000000ffffffff RBX: 0000000000000000 RCX: 0000000000000010\n[ 7.978284] RDX: 0000000000000004 RSI: 0000000000000000 RDI: ffff9190c32d4310\n[ 7.978286] RBP: 0000000000000000 R08: ffffa95fc3707d38 R09: ffff91929b81ac00\n[ 7.978287] R10: 0000000000000001 R11: ffffa95fc3707ac0 R12: 0000000000000000\n[ 7.978288] R13: ffff9190c32d4000 R14: 00000000ffffffff R15: ffff9190c4c950a8\n[ 7.978290] FS: 0000000000000000(0000) GS:ffff9193efc00000(0000) knlGS:0000000000000000\n[ 7.978292] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 8.172814] CR2: 000055d11166c000 CR3: 00000002dae10002 CR4: 00000000007706f0\n[ 8.172816] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 8.172817] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 8.172818] PKRU: 55555554\n[ 8.172819] Call Trace:\n[ 8.172823] blk_mq_alloc_tag_set+0x12e/0x310\n[ 8.264339] scsi_add_host_with_dma.cold.9+0x30/0x245\n[ 8.279302] pqi_ctrl_init+0xacf/0xc8e [smartpqi]\n[ 8.294085] ? pqi_pci_probe+0x480/0x4c8 [smartpqi]\n[ 8.309015] pqi_pci_probe+0x480/0x4c8 [smartpqi]\n[ 8.323286] local_pci_probe+0x42/0x80\n[ 8.337855] work_for_cpu_fn+0x16/0x20\n[ 8.351193] process_one_work+0x1a7/0x360\n[ 8.364462] ? create_worker+0x1a0/0x1a0\n[ 8.379252] worker_thread+0x1ce/0x390\n[ 8.392623] ? create_worker+0x1a0/0x1a0\n[ 8.406295] kthread+0x10a/0x120\n[ 8.418428] ? set_kthread_struct+0x50/0x50\n[ 8.431532] ret_from_fork+0x1f/0x40\n[ 8.444137] ---[ end trace 1bf0173d39354506 ]---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26742", url: "https://www.suse.com/security/cve/CVE-2024-26742", }, { category: "external", summary: "SUSE Bug 1222608 for CVE-2024-26742", url: "https://bugzilla.suse.com/1222608", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26742", }, { cve: "CVE-2024-26748", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26748", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: cdns3: fix memory double free when handle zero packet\n\n829 if (request->complete) {\n830 spin_unlock(&priv_dev->lock);\n831 usb_gadget_giveback_request(&priv_ep->endpoint,\n832 request);\n833 spin_lock(&priv_dev->lock);\n834 }\n835\n836 if (request->buf == priv_dev->zlp_buf)\n837 cdns3_gadget_ep_free_request(&priv_ep->endpoint, request);\n\nDriver append an additional zero packet request when queue a packet, which\nlength mod max packet size is 0. When transfer complete, run to line 831,\nusb_gadget_giveback_request() will free this requestion. 836 condition is\ntrue, so cdns3_gadget_ep_free_request() free this request again.\n\nLog:\n\n[ 1920.140696][ T150] BUG: KFENCE: use-after-free read in cdns3_gadget_giveback+0x134/0x2c0 [cdns3]\n[ 1920.140696][ T150]\n[ 1920.151837][ T150] Use-after-free read at 0x000000003d1cd10b (in kfence-#36):\n[ 1920.159082][ T150] cdns3_gadget_giveback+0x134/0x2c0 [cdns3]\n[ 1920.164988][ T150] cdns3_transfer_completed+0x438/0x5f8 [cdns3]\n\nAdd check at line 829, skip call usb_gadget_giveback_request() if it is\nadditional zero length packet request. Needn't call\nusb_gadget_giveback_request() because it is allocated in this driver.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26748", url: "https://www.suse.com/security/cve/CVE-2024-26748", }, { category: "external", summary: "SUSE Bug 1222513 for CVE-2024-26748", url: "https://bugzilla.suse.com/1222513", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26748", }, { cve: "CVE-2024-26758", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26758", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: Don't ignore suspended array in md_check_recovery()\n\nmddev_suspend() never stop sync_thread, hence it doesn't make sense to\nignore suspended array in md_check_recovery(), which might cause\nsync_thread can't be unregistered.\n\nAfter commit f52f5c71f3d4 (\"md: fix stopping sync thread\"), following\nhang can be triggered by test shell/integrity-caching.sh:\n\n1) suspend the array:\nraid_postsuspend\n mddev_suspend\n\n2) stop the array:\nraid_dtr\n md_stop\n __md_stop_writes\n stop_sync_thread\n set_bit(MD_RECOVERY_INTR, &mddev->recovery);\n md_wakeup_thread_directly(mddev->sync_thread);\n wait_event(..., !test_bit(MD_RECOVERY_RUNNING, &mddev->recovery))\n\n3) sync thread done:\nmd_do_sync\n set_bit(MD_RECOVERY_DONE, &mddev->recovery);\n md_wakeup_thread(mddev->thread);\n\n4) daemon thread can't unregister sync thread:\nmd_check_recovery\n if (mddev->suspended)\n return; -> return directly\n md_read_sync_thread\n clear_bit(MD_RECOVERY_RUNNING, &mddev->recovery);\n -> MD_RECOVERY_RUNNING can't be cleared, hence step 2 hang;\n\nThis problem is not just related to dm-raid, fix it by ignoring\nsuspended array in md_check_recovery(). And follow up patches will\nimprove dm-raid better to frozen sync thread during suspend.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26758", url: "https://www.suse.com/security/cve/CVE-2024-26758", }, { category: "external", summary: "SUSE Bug 1230341 for CVE-2024-26758", url: "https://bugzilla.suse.com/1230341", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26758", }, { cve: "CVE-2024-26764", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26764", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio\n\nIf kiocb_set_cancel_fn() is called for I/O submitted via io_uring, the\nfollowing kernel warning appears:\n\nWARNING: CPU: 3 PID: 368 at fs/aio.c:598 kiocb_set_cancel_fn+0x9c/0xa8\nCall trace:\n kiocb_set_cancel_fn+0x9c/0xa8\n ffs_epfile_read_iter+0x144/0x1d0\n io_read+0x19c/0x498\n io_issue_sqe+0x118/0x27c\n io_submit_sqes+0x25c/0x5fc\n __arm64_sys_io_uring_enter+0x104/0xab0\n invoke_syscall+0x58/0x11c\n el0_svc_common+0xb4/0xf4\n do_el0_svc+0x2c/0xb0\n el0_svc+0x2c/0xa4\n el0t_64_sync_handler+0x68/0xb4\n el0t_64_sync+0x1a4/0x1a8\n\nFix this by setting the IOCB_AIO_RW flag for read and write I/O that is\nsubmitted by libaio.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26764", url: "https://www.suse.com/security/cve/CVE-2024-26764", }, { category: "external", summary: "SUSE Bug 1222721 for CVE-2024-26764", url: "https://bugzilla.suse.com/1222721", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-26764", }, { cve: "CVE-2024-26775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26775", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\naoe: avoid potential deadlock at set_capacity\n\nMove set_capacity() outside of the section procected by (&d->lock).\nTo avoid possible interrupt unsafe locking scenario:\n\n CPU0 CPU1\n ---- ----\n[1] lock(&bdev->bd_size_lock);\n local_irq_disable();\n [2] lock(&d->lock);\n [3] lock(&bdev->bd_size_lock);\n <Interrupt>\n[4] lock(&d->lock);\n\n *** DEADLOCK ***\n\nWhere [1](&bdev->bd_size_lock) hold by zram_add()->set_capacity().\n[2]lock(&d->lock) hold by aoeblk_gdalloc(). And aoeblk_gdalloc()\nis trying to acquire [3](&bdev->bd_size_lock) at set_capacity() call.\nIn this situation an attempt to acquire [4]lock(&d->lock) from\naoecmd_cfg_rsp() will lead to deadlock.\n\nSo the simplest solution is breaking lock dependency\n[2](&d->lock) -> [3](&bdev->bd_size_lock) by moving set_capacity()\noutside.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26775", url: "https://www.suse.com/security/cve/CVE-2024-26775", }, { category: "external", summary: "SUSE Bug 1222627 for CVE-2024-26775", url: "https://bugzilla.suse.com/1222627", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26775", }, { cve: "CVE-2024-26777", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26777", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: sis: Error out if pixclock equals zero\n\nThe userspace program could pass any values to the driver through\nioctl() interface. If the driver doesn't check the value of pixclock,\nit may cause divide-by-zero error.\n\nIn sisfb_check_var(), var->pixclock is used as a divisor to caculate\ndrate before it is checked against zero. Fix this by checking it\nat the beginning.\n\nThis is similar to CVE-2022-3061 in i740fb which was fixed by\ncommit 15cf0b8.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26777", url: "https://www.suse.com/security/cve/CVE-2024-26777", }, { category: "external", summary: "SUSE Bug 1222765 for CVE-2024-26777", url: "https://bugzilla.suse.com/1222765", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26777", }, { cve: "CVE-2024-26778", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26778", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: savage: Error out if pixclock equals zero\n\nThe userspace program could pass any values to the driver through\nioctl() interface. If the driver doesn't check the value of pixclock,\nit may cause divide-by-zero error.\n\nAlthough pixclock is checked in savagefb_decode_var(), but it is not\nchecked properly in savagefb_probe(). Fix this by checking whether\npixclock is zero in the function savagefb_check_var() before\ninfo->var.pixclock is used as the divisor.\n\nThis is similar to CVE-2022-3061 in i740fb which was fixed by\ncommit 15cf0b8.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26778", url: "https://www.suse.com/security/cve/CVE-2024-26778", }, { category: "external", summary: "SUSE Bug 1222770 for CVE-2024-26778", url: "https://bugzilla.suse.com/1222770", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26778", }, { cve: "CVE-2024-26788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26788", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: fsl-qdma: init irq after reg initialization\n\nInitialize the qDMA irqs after the registers are configured so that\ninterrupts that may have been pending from a primary kernel don't get\nprocessed by the irq handler before it is ready to and cause panic with\nthe following trace:\n\n Call trace:\n fsl_qdma_queue_handler+0xf8/0x3e8\n __handle_irq_event_percpu+0x78/0x2b0\n handle_irq_event_percpu+0x1c/0x68\n handle_irq_event+0x44/0x78\n handle_fasteoi_irq+0xc8/0x178\n generic_handle_irq+0x24/0x38\n __handle_domain_irq+0x90/0x100\n gic_handle_irq+0x5c/0xb8\n el1_irq+0xb8/0x180\n _raw_spin_unlock_irqrestore+0x14/0x40\n __setup_irq+0x4bc/0x798\n request_threaded_irq+0xd8/0x190\n devm_request_threaded_irq+0x74/0xe8\n fsl_qdma_probe+0x4d4/0xca8\n platform_drv_probe+0x50/0xa0\n really_probe+0xe0/0x3f8\n driver_probe_device+0x64/0x130\n device_driver_attach+0x6c/0x78\n __driver_attach+0xbc/0x158\n bus_for_each_dev+0x5c/0x98\n driver_attach+0x20/0x28\n bus_add_driver+0x158/0x220\n driver_register+0x60/0x110\n __platform_driver_register+0x44/0x50\n fsl_qdma_driver_init+0x18/0x20\n do_one_initcall+0x48/0x258\n kernel_init_freeable+0x1a4/0x23c\n kernel_init+0x10/0xf8\n ret_from_fork+0x10/0x18", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26788", url: "https://www.suse.com/security/cve/CVE-2024-26788", }, { category: "external", summary: "SUSE Bug 1222783 for CVE-2024-26788", url: "https://bugzilla.suse.com/1222783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26788", }, { cve: "CVE-2024-26791", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26791", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: dev-replace: properly validate device names\n\nThere's a syzbot report that device name buffers passed to device\nreplace are not properly checked for string termination which could lead\nto a read out of bounds in getname_kernel().\n\nAdd a helper that validates both source and target device name buffers.\nFor devid as the source initialize the buffer to empty string in case\nsomething tries to read it later.\n\nThis was originally analyzed and fixed in a different way by Edward Adam\nDavis (see links).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26791", url: "https://www.suse.com/security/cve/CVE-2024-26791", }, { category: "external", summary: "SUSE Bug 1222793 for CVE-2024-26791", url: "https://bugzilla.suse.com/1222793", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26791", }, { cve: "CVE-2024-26801", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26801", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Avoid potential use-after-free in hci_error_reset\n\nWhile handling the HCI_EV_HARDWARE_ERROR event, if the underlying\nBT controller is not responding, the GPIO reset mechanism would\nfree the hci_dev and lead to a use-after-free in hci_error_reset.\n\nHere's the call trace observed on a ChromeOS device with Intel AX201:\n queue_work_on+0x3e/0x6c\n __hci_cmd_sync_sk+0x2ee/0x4c0 [bluetooth <HASH:3b4a6>]\n ? init_wait_entry+0x31/0x31\n __hci_cmd_sync+0x16/0x20 [bluetooth <HASH:3b4a 6>]\n hci_error_reset+0x4f/0xa4 [bluetooth <HASH:3b4a 6>]\n process_one_work+0x1d8/0x33f\n worker_thread+0x21b/0x373\n kthread+0x13a/0x152\n ? pr_cont_work+0x54/0x54\n ? kthread_blkcg+0x31/0x31\n ret_from_fork+0x1f/0x30\n\nThis patch holds the reference count on the hci_dev while processing\na HCI_EV_HARDWARE_ERROR event to avoid potential crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26801", url: "https://www.suse.com/security/cve/CVE-2024-26801", }, { category: "external", summary: "SUSE Bug 1222413 for CVE-2024-26801", url: "https://bugzilla.suse.com/1222413", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26801", }, { cve: "CVE-2024-26822", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26822", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: set correct id, uid and cruid for multiuser automounts\n\nWhen uid, gid and cruid are not specified, we need to dynamically\nset them into the filesystem context used for automounting otherwise\nthey'll end up reusing the values from the parent mount.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26822", url: "https://www.suse.com/security/cve/CVE-2024-26822", }, { category: "external", summary: "SUSE Bug 1223011 for CVE-2024-26822", url: "https://bugzilla.suse.com/1223011", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26822", }, { cve: "CVE-2024-26828", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26828", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix underflow in parse_server_interfaces()\n\nIn this loop, we step through the buffer and after each item we check\nif the size_left is greater than the minimum size we need. However,\nthe problem is that \"bytes_left\" is type ssize_t while sizeof() is type\nsize_t. That means that because of type promotion, the comparison is\ndone as an unsigned and if we have negative bytes left the loop\ncontinues instead of ending.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26828", url: "https://www.suse.com/security/cve/CVE-2024-26828", }, { category: "external", summary: "SUSE Bug 1223084 for CVE-2024-26828", url: "https://bugzilla.suse.com/1223084", }, { category: "external", summary: "SUSE Bug 1223363 for CVE-2024-26828", url: "https://bugzilla.suse.com/1223363", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2024-26828", }, { cve: "CVE-2024-26829", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26829", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: ir_toy: fix a memleak in irtoy_tx\n\nWhen irtoy_command fails, buf should be freed since it is allocated by\nirtoy_tx, or there is a memleak.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26829", url: "https://www.suse.com/security/cve/CVE-2024-26829", }, { category: "external", summary: "SUSE Bug 1223027 for CVE-2024-26829", url: "https://bugzilla.suse.com/1223027", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26829", }, { cve: "CVE-2024-26838", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26838", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: Fix KASAN issue with tasklet\n\nKASAN testing revealed the following issue assocated with freeing an IRQ.\n\n[50006.466686] Call Trace:\n[50006.466691] <IRQ>\n[50006.489538] dump_stack+0x5c/0x80\n[50006.493475] print_address_description.constprop.6+0x1a/0x150\n[50006.499872] ? irdma_sc_process_ceq+0x483/0x790 [irdma]\n[50006.505742] ? irdma_sc_process_ceq+0x483/0x790 [irdma]\n[50006.511644] kasan_report.cold.11+0x7f/0x118\n[50006.516572] ? irdma_sc_process_ceq+0x483/0x790 [irdma]\n[50006.522473] irdma_sc_process_ceq+0x483/0x790 [irdma]\n[50006.528232] irdma_process_ceq+0xb2/0x400 [irdma]\n[50006.533601] ? irdma_hw_flush_wqes_callback+0x370/0x370 [irdma]\n[50006.540298] irdma_ceq_dpc+0x44/0x100 [irdma]\n[50006.545306] tasklet_action_common.isra.14+0x148/0x2c0\n[50006.551096] __do_softirq+0x1d0/0xaf8\n[50006.555396] irq_exit_rcu+0x219/0x260\n[50006.559670] irq_exit+0xa/0x20\n[50006.563320] smp_apic_timer_interrupt+0x1bf/0x690\n[50006.568645] apic_timer_interrupt+0xf/0x20\n[50006.573341] </IRQ>\n\nThe issue is that a tasklet could be pending on another core racing\nthe delete of the irq.\n\nFix by insuring any scheduled tasklet is killed after deleting the\nirq.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26838", url: "https://www.suse.com/security/cve/CVE-2024-26838", }, { category: "external", summary: "SUSE Bug 1222974 for CVE-2024-26838", url: "https://bugzilla.suse.com/1222974", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26838", }, { cve: "CVE-2024-26839", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26839", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Fix a memleak in init_credit_return\n\nWhen dma_alloc_coherent fails to allocate dd->cr_base[i].va,\ninit_credit_return should deallocate dd->cr_base and\ndd->cr_base[i] that allocated before. Or those resources\nwould be never freed and a memleak is triggered.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26839", url: "https://www.suse.com/security/cve/CVE-2024-26839", }, { category: "external", summary: "SUSE Bug 1222975 for CVE-2024-26839", url: "https://bugzilla.suse.com/1222975", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-26839", }, { cve: "CVE-2024-26840", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26840", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: fix memory leak in cachefiles_add_cache()\n\nThe following memory leak was reported after unbinding /dev/cachefiles:\n\n==================================================================\nunreferenced object 0xffff9b674176e3c0 (size 192):\n comm \"cachefilesd2\", pid 680, jiffies 4294881224\n hex dump (first 32 bytes):\n 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace (crc ea38a44b):\n [<ffffffff8eb8a1a5>] kmem_cache_alloc+0x2d5/0x370\n [<ffffffff8e917f86>] prepare_creds+0x26/0x2e0\n [<ffffffffc002eeef>] cachefiles_determine_cache_security+0x1f/0x120\n [<ffffffffc00243ec>] cachefiles_add_cache+0x13c/0x3a0\n [<ffffffffc0025216>] cachefiles_daemon_write+0x146/0x1c0\n [<ffffffff8ebc4a3b>] vfs_write+0xcb/0x520\n [<ffffffff8ebc5069>] ksys_write+0x69/0xf0\n [<ffffffff8f6d4662>] do_syscall_64+0x72/0x140\n [<ffffffff8f8000aa>] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n==================================================================\n\nPut the reference count of cache_cred in cachefiles_daemon_unbind() to\nfix the problem. And also put cache_cred in cachefiles_add_cache() error\nbranch to avoid memory leaks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26840", url: "https://www.suse.com/security/cve/CVE-2024-26840", }, { category: "external", summary: "SUSE Bug 1222976 for CVE-2024-26840", url: "https://bugzilla.suse.com/1222976", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-26840", }, { cve: "CVE-2024-26846", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26846", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-fc: do not wait in vain when unloading module\n\nThe module exit path has race between deleting all controllers and\nfreeing 'left over IDs'. To prevent double free a synchronization\nbetween nvme_delete_ctrl and ida_destroy has been added by the initial\ncommit.\n\nThere is some logic around trying to prevent from hanging forever in\nwait_for_completion, though it does not handling all cases. E.g.\nblktests is able to reproduce the situation where the module unload\nhangs forever.\n\nIf we completely rely on the cleanup code executed from the\nnvme_delete_ctrl path, all IDs will be freed eventually. This makes\ncalling ida_destroy unnecessary. We only have to ensure that all\nnvme_delete_ctrl code has been executed before we leave\nnvme_fc_exit_module. This is done by flushing the nvme_delete_wq\nworkqueue.\n\nWhile at it, remove the unused nvme_fc_wq workqueue too.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26846", url: "https://www.suse.com/security/cve/CVE-2024-26846", }, { category: "external", summary: "SUSE Bug 1223023 for CVE-2024-26846", url: "https://bugzilla.suse.com/1223023", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26846", }, { cve: "CVE-2024-26859", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26859", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/bnx2x: Prevent access to a freed page in page_pool\n\nFix race condition leading to system crash during EEH error handling\n\nDuring EEH error recovery, the bnx2x driver's transmit timeout logic\ncould cause a race condition when handling reset tasks. The\nbnx2x_tx_timeout() schedules reset tasks via bnx2x_sp_rtnl_task(),\nwhich ultimately leads to bnx2x_nic_unload(). In bnx2x_nic_unload()\nSGEs are freed using bnx2x_free_rx_sge_range(). However, this could\noverlap with the EEH driver's attempt to reset the device using\nbnx2x_io_slot_reset(), which also tries to free SGEs. This race\ncondition can result in system crashes due to accessing freed memory\nlocations in bnx2x_free_rx_sge()\n\n799 static inline void bnx2x_free_rx_sge(struct bnx2x *bp,\n800\t\t\t\tstruct bnx2x_fastpath *fp, u16 index)\n801 {\n802\tstruct sw_rx_page *sw_buf = &fp->rx_page_ring[index];\n803 struct page *page = sw_buf->page;\n....\nwhere sw_buf was set to NULL after the call to dma_unmap_page()\nby the preceding thread.\n\n EEH: Beginning: 'slot_reset'\n PCI 0011:01:00.0#10000: EEH: Invoking bnx2x->slot_reset()\n bnx2x: [bnx2x_io_slot_reset:14228(eth1)]IO slot reset initializing...\n bnx2x 0011:01:00.0: enabling device (0140 -> 0142)\n bnx2x: [bnx2x_io_slot_reset:14244(eth1)]IO slot reset --> driver unload\n Kernel attempted to read user page (0) - exploit attempt? (uid: 0)\n BUG: Kernel NULL pointer dereference on read at 0x00000000\n Faulting instruction address: 0xc0080000025065fc\n Oops: Kernel access of bad area, sig: 11 [#1]\n .....\n Call Trace:\n [c000000003c67a20] [c00800000250658c] bnx2x_io_slot_reset+0x204/0x610 [bnx2x] (unreliable)\n [c000000003c67af0] [c0000000000518a8] eeh_report_reset+0xb8/0xf0\n [c000000003c67b60] [c000000000052130] eeh_pe_report+0x180/0x550\n [c000000003c67c70] [c00000000005318c] eeh_handle_normal_event+0x84c/0xa60\n [c000000003c67d50] [c000000000053a84] eeh_event_handler+0xf4/0x170\n [c000000003c67da0] [c000000000194c58] kthread+0x1c8/0x1d0\n [c000000003c67e10] [c00000000000cf64] ret_from_kernel_thread+0x5c/0x64\n\nTo solve this issue, we need to verify page pool allocations before\nfreeing.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26859", url: "https://www.suse.com/security/cve/CVE-2024-26859", }, { category: "external", summary: "SUSE Bug 1223049 for CVE-2024-26859", url: "https://bugzilla.suse.com/1223049", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26859", }, { cve: "CVE-2024-26870", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26870", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102\n\nA call to listxattr() with a buffer size = 0 returns the actual\nsize of the buffer needed for a subsequent call. When size > 0,\nnfs4_listxattr() does not return an error because either\ngeneric_listxattr() or nfs4_listxattr_nfs4_label() consumes\nexactly all the bytes then size is 0 when calling\nnfs4_listxattr_nfs4_user() which then triggers the following\nkernel BUG:\n\n [ 99.403778] kernel BUG at mm/usercopy.c:102!\n [ 99.404063] Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\n [ 99.408463] CPU: 0 PID: 3310 Comm: python3 Not tainted 6.6.0-61.fc40.aarch64 #1\n [ 99.415827] Call trace:\n [ 99.415985] usercopy_abort+0x70/0xa0\n [ 99.416227] __check_heap_object+0x134/0x158\n [ 99.416505] check_heap_object+0x150/0x188\n [ 99.416696] __check_object_size.part.0+0x78/0x168\n [ 99.416886] __check_object_size+0x28/0x40\n [ 99.417078] listxattr+0x8c/0x120\n [ 99.417252] path_listxattr+0x78/0xe0\n [ 99.417476] __arm64_sys_listxattr+0x28/0x40\n [ 99.417723] invoke_syscall+0x78/0x100\n [ 99.417929] el0_svc_common.constprop.0+0x48/0xf0\n [ 99.418186] do_el0_svc+0x24/0x38\n [ 99.418376] el0_svc+0x3c/0x110\n [ 99.418554] el0t_64_sync_handler+0x120/0x130\n [ 99.418788] el0t_64_sync+0x194/0x198\n [ 99.418994] Code: aa0003e3 d000a3e0 91310000 97f49bdb (d4210000)\n\nIssue is reproduced when generic_listxattr() returns 'system.nfs4_acl',\nthus calling lisxattr() with size = 16 will trigger the bug.\n\nAdd check on nfs4_listxattr() to return ERANGE error when it is\ncalled with size > 0 and the return value is greater than size.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26870", url: "https://www.suse.com/security/cve/CVE-2024-26870", }, { category: "external", summary: "SUSE Bug 1223113 for CVE-2024-26870", url: "https://bugzilla.suse.com/1223113", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26870", }, { cve: "CVE-2024-26874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26874", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip\n\nIt's possible that mtk_crtc->event is NULL in\nmtk_drm_crtc_finish_page_flip().\n\npending_needs_vblank value is set by mtk_crtc->event, but in\nmtk_drm_crtc_atomic_flush(), it's is not guarded by the same\nlock in mtk_drm_finish_page_flip(), thus a race condition happens.\n\nConsider the following case:\n\nCPU1 CPU2\nstep 1:\nmtk_drm_crtc_atomic_begin()\nmtk_crtc->event is not null,\n step 1:\n mtk_drm_crtc_atomic_flush:\n mtk_drm_crtc_update_config(\n !!mtk_crtc->event)\nstep 2:\nmtk_crtc_ddp_irq ->\nmtk_drm_finish_page_flip:\nlock\nmtk_crtc->event set to null,\npending_needs_vblank set to false\nunlock\n pending_needs_vblank set to true,\n\n step 2:\n mtk_crtc_ddp_irq ->\n mtk_drm_finish_page_flip called again,\n pending_needs_vblank is still true\n //null pointer\n\nInstead of guarding the entire mtk_drm_crtc_atomic_flush(), it's more\nefficient to just check if mtk_crtc->event is null before use.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26874", url: "https://www.suse.com/security/cve/CVE-2024-26874", }, { category: "external", summary: "SUSE Bug 1223048 for CVE-2024-26874", url: "https://bugzilla.suse.com/1223048", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26874", }, { cve: "CVE-2024-26876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26876", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/bridge: adv7511: fix crash on irq during probe\n\nMoved IRQ registration down to end of adv7511_probe().\n\nIf an IRQ already is pending during adv7511_probe\n(before adv7511_cec_init) then cec_received_msg_ts\ncould crash using uninitialized data:\n\n Unable to handle kernel read from unreadable memory at virtual address 00000000000003d5\n Internal error: Oops: 96000004 [#1] PREEMPT_RT SMP\n Call trace:\n cec_received_msg_ts+0x48/0x990 [cec]\n adv7511_cec_irq_process+0x1cc/0x308 [adv7511]\n adv7511_irq_process+0xd8/0x120 [adv7511]\n adv7511_irq_handler+0x1c/0x30 [adv7511]\n irq_thread_fn+0x30/0xa0\n irq_thread+0x14c/0x238\n kthread+0x190/0x1a8", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26876", url: "https://www.suse.com/security/cve/CVE-2024-26876", }, { category: "external", summary: "SUSE Bug 1223119 for CVE-2024-26876", url: "https://bugzilla.suse.com/1223119", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26876", }, { cve: "CVE-2024-26877", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26877", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: xilinx - call finalize with bh disabled\n\nWhen calling crypto_finalize_request, BH should be disabled to avoid\ntriggering the following calltrace:\n\n ------------[ cut here ]------------\n WARNING: CPU: 2 PID: 74 at crypto/crypto_engine.c:58 crypto_finalize_request+0xa0/0x118\n Modules linked in: cryptodev(O)\n CPU: 2 PID: 74 Comm: firmware:zynqmp Tainted: G O 6.8.0-rc1-yocto-standard #323\n Hardware name: ZynqMP ZCU102 Rev1.0 (DT)\n pstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : crypto_finalize_request+0xa0/0x118\n lr : crypto_finalize_request+0x104/0x118\n sp : ffffffc085353ce0\n x29: ffffffc085353ce0 x28: 0000000000000000 x27: ffffff8808ea8688\n x26: ffffffc081715038 x25: 0000000000000000 x24: ffffff880100db00\n x23: ffffff880100da80 x22: 0000000000000000 x21: 0000000000000000\n x20: ffffff8805b14000 x19: ffffff880100da80 x18: 0000000000010450\n x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\n x14: 0000000000000003 x13: 0000000000000000 x12: ffffff880100dad0\n x11: 0000000000000000 x10: ffffffc0832dcd08 x9 : ffffffc0812416d8\n x8 : 00000000000001f4 x7 : ffffffc0830d2830 x6 : 0000000000000001\n x5 : ffffffc082091000 x4 : ffffffc082091658 x3 : 0000000000000000\n x2 : ffffffc7f9653000 x1 : 0000000000000000 x0 : ffffff8802d20000\n Call trace:\n crypto_finalize_request+0xa0/0x118\n crypto_finalize_aead_request+0x18/0x30\n zynqmp_handle_aes_req+0xcc/0x388\n crypto_pump_work+0x168/0x2d8\n kthread_worker_fn+0xfc/0x3a0\n kthread+0x118/0x138\n ret_from_fork+0x10/0x20\n irq event stamp: 40\n hardirqs last enabled at (39): [<ffffffc0812416f8>] _raw_spin_unlock_irqrestore+0x70/0xb0\n hardirqs last disabled at (40): [<ffffffc08122d208>] el1_dbg+0x28/0x90\n softirqs last enabled at (36): [<ffffffc080017dec>] kernel_neon_begin+0x8c/0xf0\n softirqs last disabled at (34): [<ffffffc080017dc0>] kernel_neon_begin+0x60/0xf0\n ---[ end trace 0000000000000000 ]---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26877", url: "https://www.suse.com/security/cve/CVE-2024-26877", }, { category: "external", summary: "SUSE Bug 1223140 for CVE-2024-26877", url: "https://bugzilla.suse.com/1223140", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-26877", }, { cve: "CVE-2024-26880", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26880", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: call the resume method on internal suspend\n\nThere is this reported crash when experimenting with the lvm2 testsuite.\nThe list corruption is caused by the fact that the postsuspend and resume\nmethods were not paired correctly; there were two consecutive calls to the\norigin_postsuspend function. The second call attempts to remove the\n\"hash_list\" entry from a list, while it was already removed by the first\ncall.\n\nFix __dm_internal_resume so that it calls the preresume and resume\nmethods of the table's targets.\n\nIf a preresume method of some target fails, we are in a tricky situation.\nWe can't return an error because dm_internal_resume isn't supposed to\nreturn errors. We can't return success, because then the \"resume\" and\n\"postsuspend\" methods would not be paired correctly. So, we set the\nDMF_SUSPENDED flag and we fake normal suspend - it may confuse userspace\ntools, but it won't cause a kernel crash.\n\n------------[ cut here ]------------\nkernel BUG at lib/list_debug.c:56!\ninvalid opcode: 0000 [#1] PREEMPT SMP\nCPU: 1 PID: 8343 Comm: dmsetup Not tainted 6.8.0-rc6 #4\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014\nRIP: 0010:__list_del_entry_valid_or_report+0x77/0xc0\n<snip>\nRSP: 0018:ffff8881b831bcc0 EFLAGS: 00010282\nRAX: 000000000000004e RBX: ffff888143b6eb80 RCX: 0000000000000000\nRDX: 0000000000000001 RSI: ffffffff819053d0 RDI: 00000000ffffffff\nRBP: ffff8881b83a3400 R08: 00000000fffeffff R09: 0000000000000058\nR10: 0000000000000000 R11: ffffffff81a24080 R12: 0000000000000001\nR13: ffff88814538e000 R14: ffff888143bc6dc0 R15: ffffffffa02e4bb0\nFS: 00000000f7c0f780(0000) GS:ffff8893f0a40000(0000) knlGS:0000000000000000\nCS: 0010 DS: 002b ES: 002b CR0: 0000000080050033\nCR2: 0000000057fb5000 CR3: 0000000143474000 CR4: 00000000000006b0\nCall Trace:\n <TASK>\n ? die+0x2d/0x80\n ? do_trap+0xeb/0xf0\n ? __list_del_entry_valid_or_report+0x77/0xc0\n ? do_error_trap+0x60/0x80\n ? __list_del_entry_valid_or_report+0x77/0xc0\n ? exc_invalid_op+0x49/0x60\n ? __list_del_entry_valid_or_report+0x77/0xc0\n ? asm_exc_invalid_op+0x16/0x20\n ? table_deps+0x1b0/0x1b0 [dm_mod]\n ? __list_del_entry_valid_or_report+0x77/0xc0\n origin_postsuspend+0x1a/0x50 [dm_snapshot]\n dm_table_postsuspend_targets+0x34/0x50 [dm_mod]\n dm_suspend+0xd8/0xf0 [dm_mod]\n dev_suspend+0x1f2/0x2f0 [dm_mod]\n ? table_deps+0x1b0/0x1b0 [dm_mod]\n ctl_ioctl+0x300/0x5f0 [dm_mod]\n dm_compat_ctl_ioctl+0x7/0x10 [dm_mod]\n __x64_compat_sys_ioctl+0x104/0x170\n do_syscall_64+0x184/0x1b0\n entry_SYSCALL_64_after_hwframe+0x46/0x4e\nRIP: 0033:0xf7e6aead\n<snip>\n---[ end trace 0000000000000000 ]---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26880", url: "https://www.suse.com/security/cve/CVE-2024-26880", }, { category: "external", summary: "SUSE Bug 1223188 for CVE-2024-26880", url: "https://bugzilla.suse.com/1223188", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-26880", }, { cve: "CVE-2024-26889", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26889", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_core: Fix possible buffer overflow\n\nstruct hci_dev_info has a fixed size name[8] field so in the event that\nhdev->name is bigger than that strcpy would attempt to write past its\nsize, so this fixes this problem by switching to use strscpy.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26889", url: "https://www.suse.com/security/cve/CVE-2024-26889", }, { category: "external", summary: "SUSE Bug 1228195 for CVE-2024-26889", url: "https://bugzilla.suse.com/1228195", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26889", }, { cve: "CVE-2024-26894", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26894", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()\n\nAfter unregistering the CPU idle device, the memory associated with\nit is not freed, leading to a memory leak:\n\nunreferenced object 0xffff896282f6c000 (size 1024):\n comm \"swapper/0\", pid 1, jiffies 4294893170\n hex dump (first 32 bytes):\n 00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace (crc 8836a742):\n [<ffffffff993495ed>] kmalloc_trace+0x29d/0x340\n [<ffffffff9972f3b3>] acpi_processor_power_init+0xf3/0x1c0\n [<ffffffff9972d263>] __acpi_processor_start+0xd3/0xf0\n [<ffffffff9972d2bc>] acpi_processor_start+0x2c/0x50\n [<ffffffff99805872>] really_probe+0xe2/0x480\n [<ffffffff99805c98>] __driver_probe_device+0x78/0x160\n [<ffffffff99805daf>] driver_probe_device+0x1f/0x90\n [<ffffffff9980601e>] __driver_attach+0xce/0x1c0\n [<ffffffff99803170>] bus_for_each_dev+0x70/0xc0\n [<ffffffff99804822>] bus_add_driver+0x112/0x210\n [<ffffffff99807245>] driver_register+0x55/0x100\n [<ffffffff9aee4acb>] acpi_processor_driver_init+0x3b/0xc0\n [<ffffffff990012d1>] do_one_initcall+0x41/0x300\n [<ffffffff9ae7c4b0>] kernel_init_freeable+0x320/0x470\n [<ffffffff99b231f6>] kernel_init+0x16/0x1b0\n [<ffffffff99042e6d>] ret_from_fork+0x2d/0x50\n\nFix this by freeing the CPU idle device after unregistering it.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26894", url: "https://www.suse.com/security/cve/CVE-2024-26894", }, { category: "external", summary: "SUSE Bug 1223043 for CVE-2024-26894", url: "https://bugzilla.suse.com/1223043", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26894", }, { cve: "CVE-2024-26900", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26900", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix kmemleak of rdev->serial\n\nIf kobject_add() is fail in bind_rdev_to_array(), 'rdev->serial' will be\nalloc not be freed, and kmemleak occurs.\n\nunreferenced object 0xffff88815a350000 (size 49152):\n comm \"mdadm\", pid 789, jiffies 4294716910\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace (crc f773277a):\n [<0000000058b0a453>] kmemleak_alloc+0x61/0xe0\n [<00000000366adf14>] __kmalloc_large_node+0x15e/0x270\n [<000000002e82961b>] __kmalloc_node.cold+0x11/0x7f\n [<00000000f206d60a>] kvmalloc_node+0x74/0x150\n [<0000000034bf3363>] rdev_init_serial+0x67/0x170\n [<0000000010e08fe9>] mddev_create_serial_pool+0x62/0x220\n [<00000000c3837bf0>] bind_rdev_to_array+0x2af/0x630\n [<0000000073c28560>] md_add_new_disk+0x400/0x9f0\n [<00000000770e30ff>] md_ioctl+0x15bf/0x1c10\n [<000000006cfab718>] blkdev_ioctl+0x191/0x3f0\n [<0000000085086a11>] vfs_ioctl+0x22/0x60\n [<0000000018b656fe>] __x64_sys_ioctl+0xba/0xe0\n [<00000000e54e675e>] do_syscall_64+0x71/0x150\n [<000000008b0ad622>] entry_SYSCALL_64_after_hwframe+0x6c/0x74", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26900", url: "https://www.suse.com/security/cve/CVE-2024-26900", }, { category: "external", summary: "SUSE Bug 1223046 for CVE-2024-26900", url: "https://bugzilla.suse.com/1223046", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26900", }, { cve: "CVE-2024-26907", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26907", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mlx5: Fix fortify source warning while accessing Eth segment\n\n ------------[ cut here ]------------\n memcpy: detected field-spanning write (size 56) of single field \"eseg->inline_hdr.start\" at /var/lib/dkms/mlnx-ofed-kernel/5.8/build/drivers/infiniband/hw/mlx5/wr.c:131 (size 2)\n WARNING: CPU: 0 PID: 293779 at /var/lib/dkms/mlnx-ofed-kernel/5.8/build/drivers/infiniband/hw/mlx5/wr.c:131 mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]\n Modules linked in: 8021q garp mrp stp llc rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) ib_uverbs(OE) ib_core(OE) mlx5_core(OE) pci_hyperv_intf mlxdevm(OE) mlx_compat(OE) tls mlxfw(OE) psample nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink mst_pciconf(OE) knem(OE) vfio_pci vfio_pci_core vfio_iommu_type1 vfio iommufd irqbypass cuse nfsv3 nfs fscache netfs xfrm_user xfrm_algo ipmi_devintf ipmi_msghandler binfmt_misc crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 snd_pcsp aesni_intel crypto_simd cryptd snd_pcm snd_timer joydev snd soundcore input_leds serio_raw evbug nfsd auth_rpcgss nfs_acl lockd grace sch_fq_codel sunrpc drm efi_pstore ip_tables x_tables autofs4 psmouse virtio_net net_failover failover floppy\n [last unloaded: mlx_compat(OE)]\n CPU: 0 PID: 293779 Comm: ssh Tainted: G OE 6.2.0-32-generic #32~22.04.1-Ubuntu\n Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011\n RIP: 0010:mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]\n Code: 0c 01 00 a8 01 75 25 48 8b 75 a0 b9 02 00 00 00 48 c7 c2 10 5b fd c0 48 c7 c7 80 5b fd c0 c6 05 57 0c 03 00 01 e8 95 4d 93 da <0f> 0b 44 8b 4d b0 4c 8b 45 c8 48 8b 4d c0 e9 49 fb ff ff 41 0f b7\n RSP: 0018:ffffb5b48478b570 EFLAGS: 00010046\n RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\n RBP: ffffb5b48478b628 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000000 R12: ffffb5b48478b5e8\n R13: ffff963a3c609b5e R14: ffff9639c3fbd800 R15: ffffb5b480475a80\n FS: 00007fc03b444c80(0000) GS:ffff963a3dc00000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000556f46bdf000 CR3: 0000000006ac6003 CR4: 00000000003706f0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n <TASK>\n ? show_regs+0x72/0x90\n ? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]\n ? __warn+0x8d/0x160\n ? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]\n ? report_bug+0x1bb/0x1d0\n ? handle_bug+0x46/0x90\n ? exc_invalid_op+0x19/0x80\n ? asm_exc_invalid_op+0x1b/0x20\n ? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]\n mlx5_ib_post_send_nodrain+0xb/0x20 [mlx5_ib]\n ipoib_send+0x2ec/0x770 [ib_ipoib]\n ipoib_start_xmit+0x5a0/0x770 [ib_ipoib]\n dev_hard_start_xmit+0x8e/0x1e0\n ? validate_xmit_skb_list+0x4d/0x80\n sch_direct_xmit+0x116/0x3a0\n __dev_xmit_skb+0x1fd/0x580\n __dev_queue_xmit+0x284/0x6b0\n ? _raw_spin_unlock_irq+0xe/0x50\n ? __flush_work.isra.0+0x20d/0x370\n ? push_pseudo_header+0x17/0x40 [ib_ipoib]\n neigh_connected_output+0xcd/0x110\n ip_finish_output2+0x179/0x480\n ? __smp_call_single_queue+0x61/0xa0\n __ip_finish_output+0xc3/0x190\n ip_finish_output+0x2e/0xf0\n ip_output+0x78/0x110\n ? __pfx_ip_finish_output+0x10/0x10\n ip_local_out+0x64/0x70\n __ip_queue_xmit+0x18a/0x460\n ip_queue_xmit+0x15/0x30\n __tcp_transmit_skb+0x914/0x9c0\n tcp_write_xmit+0x334/0x8d0\n tcp_push_one+0x3c/0x60\n tcp_sendmsg_locked+0x2e1/0xac0\n tcp_sendmsg+0x2d/0x50\n inet_sendmsg+0x43/0x90\n sock_sendmsg+0x68/0x80\n sock_write_iter+0x93/0x100\n vfs_write+0x326/0x3c0\n ksys_write+0xbd/0xf0\n ? do_syscall_64+0x69/0x90\n __x64_sys_write+0x19/0x30\n do_syscall_\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26907", url: "https://www.suse.com/security/cve/CVE-2024-26907", }, { category: "external", summary: "SUSE Bug 1223203 for CVE-2024-26907", url: "https://bugzilla.suse.com/1223203", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 0, baseSeverity: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-26907", }, { cve: "CVE-2024-26915", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26915", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Reset IH OVERFLOW_CLEAR bit\n\nAllows us to detect subsequent IH ring buffer overflows as well.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26915", url: "https://www.suse.com/security/cve/CVE-2024-26915", }, { category: "external", summary: "SUSE Bug 1223207 for CVE-2024-26915", url: "https://bugzilla.suse.com/1223207", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26915", }, { cve: "CVE-2024-26916", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26916", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"drm/amd: flush any delayed gfxoff on suspend entry\"\n\ncommit ab4750332dbe (\"drm/amdgpu/sdma5.2: add begin/end_use ring\ncallbacks\") caused GFXOFF control to be used more heavily and the\ncodepath that was removed from commit 0dee72639533 (\"drm/amd: flush any\ndelayed gfxoff on suspend entry\") now can be exercised at suspend again.\n\nUsers report that by using GNOME to suspend the lockscreen trigger will\ncause SDMA traffic and the system can deadlock.\n\nThis reverts commit 0dee726395333fea833eaaf838bc80962df886c8.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26916", url: "https://www.suse.com/security/cve/CVE-2024-26916", }, { category: "external", summary: "SUSE Bug 1223137 for CVE-2024-26916", url: "https://bugzilla.suse.com/1223137", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26916", }, { cve: "CVE-2024-26919", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26919", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: ulpi: Fix debugfs directory leak\n\nThe ULPI per-device debugfs root is named after the ulpi device's\nparent, but ulpi_unregister_interface tries to remove a debugfs\ndirectory named after the ulpi device itself. This results in the\ndirectory sticking around and preventing subsequent (deferred) probes\nfrom succeeding. Change the directory name to match the ulpi device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26919", url: "https://www.suse.com/security/cve/CVE-2024-26919", }, { category: "external", summary: "SUSE Bug 1223847 for CVE-2024-26919", url: "https://bugzilla.suse.com/1223847", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26919", }, { cve: "CVE-2024-26920", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26920", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing/trigger: Fix to return error if failed to alloc snapshot\n\nFix register_snapshot_trigger() to return error code if it failed to\nallocate a snapshot instead of 0 (success). Unless that, it will register\nsnapshot trigger without an error.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26920", url: "https://www.suse.com/security/cve/CVE-2024-26920", }, { category: "external", summary: "SUSE Bug 1228237 for CVE-2024-26920", url: "https://bugzilla.suse.com/1228237", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26920", }, { cve: "CVE-2024-26921", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26921", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ninet: inet_defrag: prevent sk release while still in use\n\nip_local_out() and other functions can pass skb->sk as function argument.\n\nIf the skb is a fragment and reassembly happens before such function call\nreturns, the sk must not be released.\n\nThis affects skb fragments reassembled via netfilter or similar\nmodules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline.\n\nEric Dumazet made an initial analysis of this bug. Quoting Eric:\n Calling ip_defrag() in output path is also implying skb_orphan(),\n which is buggy because output path relies on sk not disappearing.\n\n A relevant old patch about the issue was :\n 8282f27449bf (\"inet: frag: Always orphan skbs inside ip_defrag()\")\n\n [..]\n\n net/ipv4/ip_output.c depends on skb->sk being set, and probably to an\n inet socket, not an arbitrary one.\n\n If we orphan the packet in ipvlan, then downstream things like FQ\n packet scheduler will not work properly.\n\n We need to change ip_defrag() to only use skb_orphan() when really\n needed, ie whenever frag_list is going to be used.\n\nEric suggested to stash sk in fragment queue and made an initial patch.\nHowever there is a problem with this:\n\nIf skb is refragmented again right after, ip_do_fragment() will copy\nhead->sk to the new fragments, and sets up destructor to sock_wfree.\nIOW, we have no choice but to fix up sk_wmem accouting to reflect the\nfully reassembled skb, else wmem will underflow.\n\nThis change moves the orphan down into the core, to last possible moment.\nAs ip_defrag_offset is aliased with sk_buff->sk member, we must move the\noffset into the FRAG_CB, else skb->sk gets clobbered.\n\nThis allows to delay the orphaning long enough to learn if the skb has\nto be queued or if the skb is completing the reasm queue.\n\nIn the former case, things work as before, skb is orphaned. This is\nsafe because skb gets queued/stolen and won't continue past reasm engine.\n\nIn the latter case, we will steal the skb->sk reference, reattach it to\nthe head skb, and fix up wmem accouting when inet_frag inflates truesize.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26921", url: "https://www.suse.com/security/cve/CVE-2024-26921", }, { category: "external", summary: "SUSE Bug 1223138 for CVE-2024-26921", url: "https://bugzilla.suse.com/1223138", }, { category: "external", summary: "SUSE Bug 1223139 for CVE-2024-26921", url: "https://bugzilla.suse.com/1223139", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26921", }, { cve: "CVE-2024-26922", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26922", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: validate the parameters of bo mapping operations more clearly\n\nVerify the parameters of\namdgpu_vm_bo_(map/replace_map/clearing_mappings) in one common place.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26922", url: "https://www.suse.com/security/cve/CVE-2024-26922", }, { category: "external", summary: "SUSE Bug 1223315 for CVE-2024-26922", url: "https://bugzilla.suse.com/1223315", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26922", }, { cve: "CVE-2024-26925", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26925", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: release mutex after nft_gc_seq_end from abort path\n\nThe commit mutex should not be released during the critical section\nbetween nft_gc_seq_begin() and nft_gc_seq_end(), otherwise, async GC\nworker could collect expired objects and get the released commit lock\nwithin the same GC sequence.\n\nnf_tables_module_autoload() temporarily releases the mutex to load\nmodule dependencies, then it goes back to replay the transaction again.\nMove it at the end of the abort phase after nft_gc_seq_end() is called.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26925", url: "https://www.suse.com/security/cve/CVE-2024-26925", }, { category: "external", summary: "SUSE Bug 1223390 for CVE-2024-26925", url: "https://bugzilla.suse.com/1223390", }, { category: "external", summary: "SUSE Bug 1224175 for CVE-2024-26925", url: "https://bugzilla.suse.com/1224175", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26925", }, { cve: "CVE-2024-26928", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26928", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in cifs_debug_files_proc_show()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26928", url: "https://www.suse.com/security/cve/CVE-2024-26928", }, { category: "external", summary: "SUSE Bug 1223532 for CVE-2024-26928", url: "https://bugzilla.suse.com/1223532", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26928", }, { cve: "CVE-2024-26929", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26929", }, ], notes: [ { category: "general", text: "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26929", url: "https://www.suse.com/security/cve/CVE-2024-26929", }, { category: "external", summary: "SUSE Bug 1223715 for CVE-2024-26929", url: "https://bugzilla.suse.com/1223715", }, { category: "external", summary: "SUSE Bug 1223716 for CVE-2024-26929", url: "https://bugzilla.suse.com/1223716", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2024-26929", }, { cve: "CVE-2024-26930", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26930", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix double free of the ha->vp_map pointer\n\nCoverity scan reported potential risk of double free of the pointer\nha->vp_map. ha->vp_map was freed in qla2x00_mem_alloc(), and again freed\nin function qla2x00_mem_free(ha).\n\nAssign NULL to vp_map and kfree take care of NULL.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26930", url: "https://www.suse.com/security/cve/CVE-2024-26930", }, { category: "external", summary: "SUSE Bug 1223626 for CVE-2024-26930", url: "https://bugzilla.suse.com/1223626", }, { category: "external", summary: "SUSE Bug 1223681 for CVE-2024-26930", url: "https://bugzilla.suse.com/1223681", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2024-26930", }, { cve: "CVE-2024-26931", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26931", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix command flush on cable pull\n\nSystem crash due to command failed to flush back to SCSI layer.\n\n BUG: unable to handle kernel NULL pointer dereference at 0000000000000000\n PGD 0 P4D 0\n Oops: 0000 [#1] SMP NOPTI\n CPU: 27 PID: 793455 Comm: kworker/u130:6 Kdump: loaded Tainted: G OE --------- - - 4.18.0-372.9.1.el8.x86_64 #1\n Hardware name: HPE ProLiant DL360 Gen10/ProLiant DL360 Gen10, BIOS U32 09/03/2021\n Workqueue: nvme-wq nvme_fc_connect_ctrl_work [nvme_fc]\n RIP: 0010:__wake_up_common+0x4c/0x190\n Code: 24 10 4d 85 c9 74 0a 41 f6 01 04 0f 85 9d 00 00 00 48 8b 43 08 48 83 c3 08 4c 8d 48 e8 49 8d 41 18 48 39 c3 0f 84 f0 00 00 00 <49> 8b 41 18 89 54 24 08 31 ed 4c 8d 70 e8 45 8b 29 41 f6 c5 04 75\n RSP: 0018:ffff95f3e0cb7cd0 EFLAGS: 00010086\n RAX: 0000000000000000 RBX: ffff8b08d3b26328 RCX: 0000000000000000\n RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffff8b08d3b26320\n RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffe8\n R10: 0000000000000000 R11: ffff95f3e0cb7a60 R12: ffff95f3e0cb7d20\n R13: 0000000000000003 R14: 0000000000000000 R15: 0000000000000000\n FS: 0000000000000000(0000) GS:ffff8b2fdf6c0000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 0000002f1e410002 CR4: 00000000007706e0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 55555554\n Call Trace:\n __wake_up_common_lock+0x7c/0xc0\n qla_nvme_ls_req+0x355/0x4c0 [qla2xxx]\n qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae1407ca000 from port 21:32:00:02:ac:07:ee:b8 loop_id 0x02 s_id 01:02:00 logout 1 keep 0 els_logo 0\n ? __nvme_fc_send_ls_req+0x260/0x380 [nvme_fc]\n qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:00:02:ac:07:ee:b8 state transitioned from ONLINE to LOST - portid=010200.\n ? nvme_fc_send_ls_req.constprop.42+0x1a/0x45 [nvme_fc]\n qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320002ac07eeb8. rport ffff8ae598122000 roles 1\n ? nvme_fc_connect_ctrl_work.cold.63+0x1e3/0xa7d [nvme_fc]\n qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae14801e000 from port 21:32:01:02:ad:f7:ee:b8 loop_id 0x04 s_id 01:02:01 logout 1 keep 0 els_logo 0\n ? __switch_to+0x10c/0x450\n ? process_one_work+0x1a7/0x360\n qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:01:02:ad:f7:ee:b8 state transitioned from ONLINE to LOST - portid=010201.\n ? worker_thread+0x1ce/0x390\n ? create_worker+0x1a0/0x1a0\n qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320102adf7eeb8. rport ffff8ae3b2312800 roles 70\n ? kthread+0x10a/0x120\n qla2xxx [0000:12:00.1]-2112:3: qla_nvme_unregister_remote_port: unregister remoteport on ffff8ae14801e000 21320102adf7eeb8\n ? set_kthread_struct+0x40/0x40\n qla2xxx [0000:12:00.1]-2110:3: remoteport_delete of ffff8ae14801e000 21320102adf7eeb8 completed.\n ? ret_from_fork+0x1f/0x40\n qla2xxx [0000:12:00.1]-f086:3: qlt_free_session_done: waiting for sess ffff8ae14801e000 logout\n\nThe system was under memory stress where driver was not able to allocate an\nSRB to carry out error recovery of cable pull. The failure to flush causes\nupper layer to start modifying scsi_cmnd. When the system frees up some\nmemory, the subsequent cable pull trigger another command flush. At this\npoint the driver access a null pointer when attempting to DMA unmap the\nSGL.\n\nAdd a check to make sure commands are flush back on session tear down to\nprevent the null pointer access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26931", url: "https://www.suse.com/security/cve/CVE-2024-26931", }, { category: "external", summary: "SUSE Bug 1223627 for CVE-2024-26931", url: "https://bugzilla.suse.com/1223627", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26931", }, { cve: "CVE-2024-26933", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26933", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix deadlock in port \"disable\" sysfs attribute\n\nThe show and store callback routines for the \"disable\" sysfs attribute\nfile in port.c acquire the device lock for the port's parent hub\ndevice. This can cause problems if another process has locked the hub\nto remove it or change its configuration:\n\n\tRemoving the hub or changing its configuration requires the\n\thub interface to be removed, which requires the port device\n\tto be removed, and device_del() waits until all outstanding\n\tsysfs attribute callbacks for the ports have returned. The\n\tlock can't be released until then.\n\n\tBut the disable_show() or disable_store() routine can't return\n\tuntil after it has acquired the lock.\n\nThe resulting deadlock can be avoided by calling\nsysfs_break_active_protection(). This will cause the sysfs core not\nto wait for the attribute's callback routine to return, allowing the\nremoval to proceed. The disadvantage is that after making this call,\nthere is no guarantee that the hub structure won't be deallocated at\nany moment. To prevent this, we have to acquire a reference to it\nfirst by calling hub_get().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26933", url: "https://www.suse.com/security/cve/CVE-2024-26933", }, { category: "external", summary: "SUSE Bug 1223670 for CVE-2024-26933", url: "https://bugzilla.suse.com/1223670", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26933", }, { cve: "CVE-2024-26934", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26934", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix deadlock in usb_deauthorize_interface()\n\nAmong the attribute file callback routines in\ndrivers/usb/core/sysfs.c, the interface_authorized_store() function is\nthe only one which acquires a device lock on an ancestor device: It\ncalls usb_deauthorize_interface(), which locks the interface's parent\nUSB device.\n\nThe will lead to deadlock if another process already owns that lock\nand tries to remove the interface, whether through a configuration\nchange or because the device has been disconnected. As part of the\nremoval procedure, device_del() waits for all ongoing sysfs attribute\ncallbacks to complete. But usb_deauthorize_interface() can't complete\nuntil the device lock has been released, and the lock won't be\nreleased until the removal has finished.\n\nThe mechanism provided by sysfs to prevent this kind of deadlock is\nto use the sysfs_break_active_protection() function, which tells sysfs\nnot to wait for the attribute callback.\n\nReported-and-tested by: Yue Sun <samsun1006219@gmail.com>\nReported by: xingwei lee <xrivendell7@gmail.com>", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26934", url: "https://www.suse.com/security/cve/CVE-2024-26934", }, { category: "external", summary: "SUSE Bug 1223671 for CVE-2024-26934", url: "https://bugzilla.suse.com/1223671", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26934", }, { cve: "CVE-2024-26935", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26935", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix unremoved procfs host directory regression\n\nCommit fc663711b944 (\"scsi: core: Remove the /proc/scsi/${proc_name}\ndirectory earlier\") fixed a bug related to modules loading/unloading, by\nadding a call to scsi_proc_hostdir_rm() on scsi_remove_host(). But that led\nto a potential duplicate call to the hostdir_rm() routine, since it's also\ncalled from scsi_host_dev_release(). That triggered a regression report,\nwhich was then fixed by commit be03df3d4bfe (\"scsi: core: Fix a procfs host\ndirectory removal regression\"). The fix just dropped the hostdir_rm() call\nfrom dev_release().\n\nBut it happens that this proc directory is created on scsi_host_alloc(),\nand that function \"pairs\" with scsi_host_dev_release(), while\nscsi_remove_host() pairs with scsi_add_host(). In other words, it seems the\nreason for removing the proc directory on dev_release() was meant to cover\ncases in which a SCSI host structure was allocated, but the call to\nscsi_add_host() didn't happen. And that pattern happens to exist in some\nerror paths, for example.\n\nSyzkaller causes that by using USB raw gadget device, error'ing on\nusb-storage driver, at usb_stor_probe2(). By checking that path, we can see\nthat the BadDevice label leads to a scsi_host_put() after a SCSI host\nallocation, but there's no call to scsi_add_host() in such path. That leads\nto messages like this in dmesg (and a leak of the SCSI host proc\nstructure):\n\nusb-storage 4-1:87.51: USB Mass Storage device detected\nproc_dir_entry 'scsi/usb-storage' already registered\nWARNING: CPU: 1 PID: 3519 at fs/proc/generic.c:377 proc_register+0x347/0x4e0 fs/proc/generic.c:376\n\nThe proper fix seems to still call scsi_proc_hostdir_rm() on dev_release(),\nbut guard that with the state check for SHOST_CREATED; there is even a\ncomment in scsi_host_dev_release() detailing that: such conditional is\nmeant for cases where the SCSI host was allocated but there was no calls to\n{add,remove}_host(), like the usb-storage case.\n\nThis is what we propose here and with that, the error path of usb-storage\ndoes not trigger the warning anymore.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26935", url: "https://www.suse.com/security/cve/CVE-2024-26935", }, { category: "external", summary: "SUSE Bug 1223675 for CVE-2024-26935", url: "https://bugzilla.suse.com/1223675", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-26935", }, { cve: "CVE-2024-26937", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26937", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/gt: Reset queue_priority_hint on parking\n\nOriginally, with strict in order execution, we could complete execution\nonly when the queue was empty. Preempt-to-busy allows replacement of an\nactive request that may complete before the preemption is processed by\nHW. If that happens, the request is retired from the queue, but the\nqueue_priority_hint remains set, preventing direct submission until\nafter the next CS interrupt is processed.\n\nThis preempt-to-busy race can be triggered by the heartbeat, which will\nalso act as the power-management barrier and upon completion allow us to\nidle the HW. We may process the completion of the heartbeat, and begin\nparking the engine before the CS event that restores the\nqueue_priority_hint, causing us to fail the assertion that it is MIN.\n\n<3>[ 166.210729] __engine_park:283 GEM_BUG_ON(engine->sched_engine->queue_priority_hint != (-((int)(~0U >> 1)) - 1))\n<0>[ 166.210781] Dumping ftrace buffer:\n<0>[ 166.210795] ---------------------------------\n...\n<0>[ 167.302811] drm_fdin-1097 2..s1. 165741070us : trace_ports: 0000:00:02.0 rcs0: promote { ccid:20 1217:2 prio 0 }\n<0>[ 167.302861] drm_fdin-1097 2d.s2. 165741072us : execlists_submission_tasklet: 0000:00:02.0 rcs0: preempting last=1217:2, prio=0, hint=2147483646\n<0>[ 167.302928] drm_fdin-1097 2d.s2. 165741072us : __i915_request_unsubmit: 0000:00:02.0 rcs0: fence 1217:2, current 0\n<0>[ 167.302992] drm_fdin-1097 2d.s2. 165741073us : __i915_request_submit: 0000:00:02.0 rcs0: fence 3:4660, current 4659\n<0>[ 167.303044] drm_fdin-1097 2d.s1. 165741076us : execlists_submission_tasklet: 0000:00:02.0 rcs0: context:3 schedule-in, ccid:40\n<0>[ 167.303095] drm_fdin-1097 2d.s1. 165741077us : trace_ports: 0000:00:02.0 rcs0: submit { ccid:40 3:4660* prio 2147483646 }\n<0>[ 167.303159] kworker/-89 11..... 165741139us : i915_request_retire.part.0: 0000:00:02.0 rcs0: fence c90:2, current 2\n<0>[ 167.303208] kworker/-89 11..... 165741148us : __intel_context_do_unpin: 0000:00:02.0 rcs0: context:c90 unpin\n<0>[ 167.303272] kworker/-89 11..... 165741159us : i915_request_retire.part.0: 0000:00:02.0 rcs0: fence 1217:2, current 2\n<0>[ 167.303321] kworker/-89 11..... 165741166us : __intel_context_do_unpin: 0000:00:02.0 rcs0: context:1217 unpin\n<0>[ 167.303384] kworker/-89 11..... 165741170us : i915_request_retire.part.0: 0000:00:02.0 rcs0: fence 3:4660, current 4660\n<0>[ 167.303434] kworker/-89 11d..1. 165741172us : __intel_context_retire: 0000:00:02.0 rcs0: context:1216 retire runtime: { total:56028ns, avg:56028ns }\n<0>[ 167.303484] kworker/-89 11..... 165741198us : __engine_park: 0000:00:02.0 rcs0: parked\n<0>[ 167.303534] <idle>-0 5d.H3. 165741207us : execlists_irq_handler: 0000:00:02.0 rcs0: semaphore yield: 00000040\n<0>[ 167.303583] kworker/-89 11..... 165741397us : __intel_context_retire: 0000:00:02.0 rcs0: context:1217 retire runtime: { total:325575ns, avg:0ns }\n<0>[ 167.303756] kworker/-89 11..... 165741777us : __intel_context_retire: 0000:00:02.0 rcs0: context:c90 retire runtime: { total:0ns, avg:0ns }\n<0>[ 167.303806] kworker/-89 11..... 165742017us : __engine_park: __engine_park:283 GEM_BUG_ON(engine->sched_engine->queue_priority_hint != (-((int)(~0U >> 1)) - 1))\n<0>[ 167.303811] ---------------------------------\n<4>[ 167.304722] ------------[ cut here ]------------\n<2>[ 167.304725] kernel BUG at drivers/gpu/drm/i915/gt/intel_engine_pm.c:283!\n<4>[ 167.304731] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n<4>[ 167.304734] CPU: 11 PID: 89 Comm: kworker/11:1 Tainted: G W 6.8.0-rc2-CI_DRM_14193-gc655e0fd2804+ #1\n<4>[ 167.304736] Hardware name: Intel Corporation Rocket Lake Client Platform/RocketLake S UDIMM 6L RVP, BIOS RKLSFWI1.R00.3173.A03.2204210138 04/21/2022\n<4>[ 167.304738] Workqueue: i915-unordered retire_work_handler [i915]\n<4>[ 16\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26937", url: "https://www.suse.com/security/cve/CVE-2024-26937", }, { category: "external", summary: "SUSE Bug 1223677 for CVE-2024-26937", url: "https://bugzilla.suse.com/1223677", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-26937", }, { cve: "CVE-2024-26938", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26938", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode()\n\nIf we have no VBT, or the VBT didn't declare the encoder\nin question, we won't have the 'devdata' for the encoder.\nInstead of oopsing just bail early.\n\nWe won't be able to tell whether the port is DP++ or not,\nbut so be it.\n\n(cherry picked from commit 26410896206342c8a80d2b027923e9ee7d33b733)", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26938", url: "https://www.suse.com/security/cve/CVE-2024-26938", }, { category: "external", summary: "SUSE Bug 1223678 for CVE-2024-26938", url: "https://bugzilla.suse.com/1223678", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-26938", }, { cve: "CVE-2024-26939", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26939", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/vma: Fix UAF on destroy against retire race\n\nObject debugging tools were sporadically reporting illegal attempts to\nfree a still active i915 VMA object when parking a GT believed to be idle.\n\n[161.359441] ODEBUG: free active (active state 0) object: ffff88811643b958 object type: i915_active hint: __i915_vma_active+0x0/0x50 [i915]\n[161.360082] WARNING: CPU: 5 PID: 276 at lib/debugobjects.c:514 debug_print_object+0x80/0xb0\n...\n[161.360304] CPU: 5 PID: 276 Comm: kworker/5:2 Not tainted 6.5.0-rc1-CI_DRM_13375-g003f860e5577+ #1\n[161.360314] Hardware name: Intel Corporation Rocket Lake Client Platform/RocketLake S UDIMM 6L RVP, BIOS RKLSFWI1.R00.3173.A03.2204210138 04/21/2022\n[161.360322] Workqueue: i915-unordered __intel_wakeref_put_work [i915]\n[161.360592] RIP: 0010:debug_print_object+0x80/0xb0\n...\n[161.361347] debug_object_free+0xeb/0x110\n[161.361362] i915_active_fini+0x14/0x130 [i915]\n[161.361866] release_references+0xfe/0x1f0 [i915]\n[161.362543] i915_vma_parked+0x1db/0x380 [i915]\n[161.363129] __gt_park+0x121/0x230 [i915]\n[161.363515] ____intel_wakeref_put_last+0x1f/0x70 [i915]\n\nThat has been tracked down to be happening when another thread is\ndeactivating the VMA inside __active_retire() helper, after the VMA's\nactive counter has been already decremented to 0, but before deactivation\nof the VMA's object is reported to the object debugging tool.\n\nWe could prevent from that race by serializing i915_active_fini() with\n__active_retire() via ref->tree_lock, but that wouldn't stop the VMA from\nbeing used, e.g. from __i915_vma_retire() called at the end of\n__active_retire(), after that VMA has been already freed by a concurrent\ni915_vma_destroy() on return from the i915_active_fini(). Then, we should\nrather fix the issue at the VMA level, not in i915_active.\n\nSince __i915_vma_parked() is called from __gt_park() on last put of the\nGT's wakeref, the issue could be addressed by holding the GT wakeref long\nenough for __active_retire() to complete before that wakeref is released\nand the GT parked.\n\nI believe the issue was introduced by commit d93939730347 (\"drm/i915:\nRemove the vma refcount\") which moved a call to i915_active_fini() from\na dropped i915_vma_release(), called on last put of the removed VMA kref,\nto i915_vma_parked() processing path called on last put of a GT wakeref.\nHowever, its visibility to the object debugging tool was suppressed by a\nbug in i915_active that was fixed two weeks later with commit e92eb246feb9\n(\"drm/i915/active: Fix missing debug object activation\").\n\nA VMA associated with a request doesn't acquire a GT wakeref by itself.\nInstead, it depends on a wakeref held directly by the request's active\nintel_context for a GT associated with its VM, and indirectly on that\nintel_context's engine wakeref if the engine belongs to the same GT as the\nVMA's VM. Those wakerefs are released asynchronously to VMA deactivation.\n\nFix the issue by getting a wakeref for the VMA's GT when activating it,\nand putting that wakeref only after the VMA is deactivated. However,\nexclude global GTT from that processing path, otherwise the GPU never goes\nidle. Since __i915_vma_retire() may be called from atomic contexts, use\nasync variant of wakeref put. Also, to avoid circular locking dependency,\ntake care of acquiring the wakeref before VM mutex when both are needed.\n\nv7: Add inline comments with justifications for:\n - using untracked variants of intel_gt_pm_get/put() (Nirmoy),\n - using async variant of _put(),\n - not getting the wakeref in case of a global GTT,\n - always getting the first wakeref outside vm->mutex.\nv6: Since __i915_vma_active/retire() callbacks are not serialized, storing\n a wakeref tracking handle inside struct i915_vma is not safe, and\n there is no other good place for that. Use untracked variants of\n intel_gt_pm_get/put_async().\nv5: Replace \"tile\" with \"GT\" across commit description (Rodrigo),\n - \n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26939", url: "https://www.suse.com/security/cve/CVE-2024-26939", }, { category: "external", summary: "SUSE Bug 1223679 for CVE-2024-26939", url: "https://bugzilla.suse.com/1223679", }, { category: "external", summary: "SUSE Bug 1223680 for CVE-2024-26939", url: "https://bugzilla.suse.com/1223680", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2024-26939", }, { cve: "CVE-2024-26940", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26940", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed\n\nThe driver creates /sys/kernel/debug/dri/0/mob_ttm even when the\ncorresponding ttm_resource_manager is not allocated.\nThis leads to a crash when trying to read from this file.\n\nAdd a check to create mob_ttm, system_mob_ttm, and gmr_ttm debug file\nonly when the corresponding ttm_resource_manager is allocated.\n\ncrash> bt\nPID: 3133409 TASK: ffff8fe4834a5000 CPU: 3 COMMAND: \"grep\"\n #0 [ffffb954506b3b20] machine_kexec at ffffffffb2a6bec3\n #1 [ffffb954506b3b78] __crash_kexec at ffffffffb2bb598a\n #2 [ffffb954506b3c38] crash_kexec at ffffffffb2bb68c1\n #3 [ffffb954506b3c50] oops_end at ffffffffb2a2a9b1\n #4 [ffffb954506b3c70] no_context at ffffffffb2a7e913\n #5 [ffffb954506b3cc8] __bad_area_nosemaphore at ffffffffb2a7ec8c\n #6 [ffffb954506b3d10] do_page_fault at ffffffffb2a7f887\n #7 [ffffb954506b3d40] page_fault at ffffffffb360116e\n [exception RIP: ttm_resource_manager_debug+0x11]\n RIP: ffffffffc04afd11 RSP: ffffb954506b3df0 RFLAGS: 00010246\n RAX: ffff8fe41a6d1200 RBX: 0000000000000000 RCX: 0000000000000940\n RDX: 0000000000000000 RSI: ffffffffc04b4338 RDI: 0000000000000000\n RBP: ffffb954506b3e08 R8: ffff8fee3ffad000 R9: 0000000000000000\n R10: ffff8fe41a76a000 R11: 0000000000000001 R12: 00000000ffffffff\n R13: 0000000000000001 R14: ffff8fe5bb6f3900 R15: ffff8fe41a6d1200\n ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018\n #8 [ffffb954506b3e00] ttm_resource_manager_show at ffffffffc04afde7 [ttm]\n #9 [ffffb954506b3e30] seq_read at ffffffffb2d8f9f3\n RIP: 00007f4c4eda8985 RSP: 00007ffdbba9e9f8 RFLAGS: 00000246\n RAX: ffffffffffffffda RBX: 000000000037e000 RCX: 00007f4c4eda8985\n RDX: 000000000037e000 RSI: 00007f4c41573000 RDI: 0000000000000003\n RBP: 000000000037e000 R8: 0000000000000000 R9: 000000000037fe30\n R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c41573000\n R13: 0000000000000003 R14: 00007f4c41572010 R15: 0000000000000003\n ORIG_RAX: 0000000000000000 CS: 0033 SS: 002b", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26940", url: "https://www.suse.com/security/cve/CVE-2024-26940", }, { category: "external", summary: "SUSE Bug 1223718 for CVE-2024-26940", url: "https://bugzilla.suse.com/1223718", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26940", }, { cve: "CVE-2024-26943", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26943", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnouveau/dmem: handle kcalloc() allocation failure\n\nThe kcalloc() in nouveau_dmem_evict_chunk() will return null if\nthe physical memory has run out. As a result, if we dereference\nsrc_pfns, dst_pfns or dma_addrs, the null pointer dereference bugs\nwill happen.\n\nMoreover, the GPU is going away. If the kcalloc() fails, we could not\nevict all pages mapping a chunk. So this patch adds a __GFP_NOFAIL\nflag in kcalloc().\n\nFinally, as there is no need to have physically contiguous memory,\nthis patch switches kcalloc() to kvcalloc() in order to avoid\nfailing allocations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26943", url: "https://www.suse.com/security/cve/CVE-2024-26943", }, { category: "external", summary: "SUSE Bug 1230527 for CVE-2024-26943", url: "https://bugzilla.suse.com/1230527", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26943", }, { cve: "CVE-2024-26957", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26957", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/zcrypt: fix reference counting on zcrypt card objects\n\nTests with hot-plugging crytpo cards on KVM guests with debug\nkernel build revealed an use after free for the load field of\nthe struct zcrypt_card. The reason was an incorrect reference\nhandling of the zcrypt card object which could lead to a free\nof the zcrypt card object while it was still in use.\n\nThis is an example of the slab message:\n\n kernel: 0x00000000885a7512-0x00000000885a7513 @offset=1298. First byte 0x68 instead of 0x6b\n kernel: Allocated in zcrypt_card_alloc+0x36/0x70 [zcrypt] age=18046 cpu=3 pid=43\n kernel: kmalloc_trace+0x3f2/0x470\n kernel: zcrypt_card_alloc+0x36/0x70 [zcrypt]\n kernel: zcrypt_cex4_card_probe+0x26/0x380 [zcrypt_cex4]\n kernel: ap_device_probe+0x15c/0x290\n kernel: really_probe+0xd2/0x468\n kernel: driver_probe_device+0x40/0xf0\n kernel: __device_attach_driver+0xc0/0x140\n kernel: bus_for_each_drv+0x8c/0xd0\n kernel: __device_attach+0x114/0x198\n kernel: bus_probe_device+0xb4/0xc8\n kernel: device_add+0x4d2/0x6e0\n kernel: ap_scan_adapter+0x3d0/0x7c0\n kernel: ap_scan_bus+0x5a/0x3b0\n kernel: ap_scan_bus_wq_callback+0x40/0x60\n kernel: process_one_work+0x26e/0x620\n kernel: worker_thread+0x21c/0x440\n kernel: Freed in zcrypt_card_put+0x54/0x80 [zcrypt] age=9024 cpu=3 pid=43\n kernel: kfree+0x37e/0x418\n kernel: zcrypt_card_put+0x54/0x80 [zcrypt]\n kernel: ap_device_remove+0x4c/0xe0\n kernel: device_release_driver_internal+0x1c4/0x270\n kernel: bus_remove_device+0x100/0x188\n kernel: device_del+0x164/0x3c0\n kernel: device_unregister+0x30/0x90\n kernel: ap_scan_adapter+0xc8/0x7c0\n kernel: ap_scan_bus+0x5a/0x3b0\n kernel: ap_scan_bus_wq_callback+0x40/0x60\n kernel: process_one_work+0x26e/0x620\n kernel: worker_thread+0x21c/0x440\n kernel: kthread+0x150/0x168\n kernel: __ret_from_fork+0x3c/0x58\n kernel: ret_from_fork+0xa/0x30\n kernel: Slab 0x00000372022169c0 objects=20 used=18 fp=0x00000000885a7c88 flags=0x3ffff00000000a00(workingset|slab|node=0|zone=1|lastcpupid=0x1ffff)\n kernel: Object 0x00000000885a74b8 @offset=1208 fp=0x00000000885a7c88\n kernel: Redzone 00000000885a74b0: bb bb bb bb bb bb bb bb ........\n kernel: Object 00000000885a74b8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk\n kernel: Object 00000000885a74c8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk\n kernel: Object 00000000885a74d8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk\n kernel: Object 00000000885a74e8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk\n kernel: Object 00000000885a74f8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk\n kernel: Object 00000000885a7508: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 68 4b 6b 6b 6b a5 kkkkkkkkkkhKkkk.\n kernel: Redzone 00000000885a7518: bb bb bb bb bb bb bb bb ........\n kernel: Padding 00000000885a756c: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZ\n kernel: CPU: 0 PID: 387 Comm: systemd-udevd Not tainted 6.8.0-HF #2\n kernel: Hardware name: IBM 3931 A01 704 (KVM/Linux)\n kernel: Call Trace:\n kernel: [<00000000ca5ab5b8>] dump_stack_lvl+0x90/0x120\n kernel: [<00000000c99d78bc>] check_bytes_and_report+0x114/0x140\n kernel: [<00000000c99d53cc>] check_object+0x334/0x3f8\n kernel: [<00000000c99d820c>] alloc_debug_processing+0xc4/0x1f8\n kernel: [<00000000c99d852e>] get_partial_node.part.0+0x1ee/0x3e0\n kernel: [<00000000c99d94ec>] ___slab_alloc+0xaf4/0x13c8\n kernel: [<00000000c99d9e38>] __slab_alloc.constprop.0+0x78/0xb8\n kernel: [<00000000c99dc8dc>] __kmalloc+0x434/0x590\n kernel: [<00000000c9b4c0ce>] ext4_htree_store_dirent+0x4e/0x1c0\n kernel: [<00000000c9b908a2>] htree_dirblock_to_tree+0x17a/0x3f0\n kernel: \n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26957", url: "https://www.suse.com/security/cve/CVE-2024-26957", }, { category: "external", summary: "SUSE Bug 1223666 for CVE-2024-26957", url: "https://bugzilla.suse.com/1223666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26957", }, { cve: "CVE-2024-26958", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26958", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: fix UAF in direct writes\n\nIn production we have been hitting the following warning consistently\n\n------------[ cut here ]------------\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 17 PID: 1800359 at lib/refcount.c:28 refcount_warn_saturate+0x9c/0xe0\nWorkqueue: nfsiod nfs_direct_write_schedule_work [nfs]\nRIP: 0010:refcount_warn_saturate+0x9c/0xe0\nPKRU: 55555554\nCall Trace:\n <TASK>\n ? __warn+0x9f/0x130\n ? refcount_warn_saturate+0x9c/0xe0\n ? report_bug+0xcc/0x150\n ? handle_bug+0x3d/0x70\n ? exc_invalid_op+0x16/0x40\n ? asm_exc_invalid_op+0x16/0x20\n ? refcount_warn_saturate+0x9c/0xe0\n nfs_direct_write_schedule_work+0x237/0x250 [nfs]\n process_one_work+0x12f/0x4a0\n worker_thread+0x14e/0x3b0\n ? ZSTD_getCParams_internal+0x220/0x220\n kthread+0xdc/0x120\n ? __btf_name_valid+0xa0/0xa0\n ret_from_fork+0x1f/0x30\n\nThis is because we're completing the nfs_direct_request twice in a row.\n\nThe source of this is when we have our commit requests to submit, we\nprocess them and send them off, and then in the completion path for the\ncommit requests we have\n\nif (nfs_commit_end(cinfo.mds))\n\tnfs_direct_write_complete(dreq);\n\nHowever since we're submitting asynchronous requests we sometimes have\none that completes before we submit the next one, so we end up calling\ncomplete on the nfs_direct_request twice.\n\nThe only other place we use nfs_generic_commit_list() is in\n__nfs_commit_inode, which wraps this call in a\n\nnfs_commit_begin();\nnfs_commit_end();\n\nWhich is a common pattern for this style of completion handling, one\nthat is also repeated in the direct code with get_dreq()/put_dreq()\ncalls around where we process events as well as in the completion paths.\n\nFix this by using the same pattern for the commit requests.\n\nBefore with my 200 node rocksdb stress running this warning would pop\nevery 10ish minutes. With my patch the stress test has been running for\nseveral hours without popping.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26958", url: "https://www.suse.com/security/cve/CVE-2024-26958", }, { category: "external", summary: "SUSE Bug 1223653 for CVE-2024-26958", url: "https://bugzilla.suse.com/1223653", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26958", }, { cve: "CVE-2024-26964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26964", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci: Add error handling in xhci_map_urb_for_dma\n\nCurrently xhci_map_urb_for_dma() creates a temporary buffer and copies\nthe SG list to the new linear buffer. But if the kzalloc_node() fails,\nthen the following sg_pcopy_to_buffer() can lead to crash since it\ntries to memcpy to NULL pointer.\n\nSo return -ENOMEM if kzalloc returns null pointer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26964", url: "https://www.suse.com/security/cve/CVE-2024-26964", }, { category: "external", summary: "SUSE Bug 1223650 for CVE-2024-26964", url: "https://bugzilla.suse.com/1223650", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26964", }, { cve: "CVE-2024-26974", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26974", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - resolve race condition during AER recovery\n\nDuring the PCI AER system's error recovery process, the kernel driver\nmay encounter a race condition with freeing the reset_data structure's\nmemory. If the device restart will take more than 10 seconds the function\nscheduling that restart will exit due to a timeout, and the reset_data\nstructure will be freed. However, this data structure is used for\ncompletion notification after the restart is completed, which leads\nto a UAF bug.\n\nThis results in a KFENCE bug notice.\n\n BUG: KFENCE: use-after-free read in adf_device_reset_worker+0x38/0xa0 [intel_qat]\n Use-after-free read at 0x00000000bc56fddf (in kfence-#142):\n adf_device_reset_worker+0x38/0xa0 [intel_qat]\n process_one_work+0x173/0x340\n\nTo resolve this race condition, the memory associated to the container\nof the work_struct is freed on the worker if the timeout expired,\notherwise on the function that schedules the worker.\nThe timeout detection can be done by checking if the caller is\nstill waiting for completion or not by using completion_done() function.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26974", url: "https://www.suse.com/security/cve/CVE-2024-26974", }, { category: "external", summary: "SUSE Bug 1223638 for CVE-2024-26974", url: "https://bugzilla.suse.com/1223638", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26974", }, { cve: "CVE-2024-26977", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26977", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\npci_iounmap(): Fix MMIO mapping leak\n\nThe #ifdef ARCH_HAS_GENERIC_IOPORT_MAP accidentally also guards iounmap(),\nwhich means MMIO mappings are leaked.\n\nMove the guard so we call iounmap() for MMIO mappings.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26977", url: "https://www.suse.com/security/cve/CVE-2024-26977", }, { category: "external", summary: "SUSE Bug 1223631 for CVE-2024-26977", url: "https://bugzilla.suse.com/1223631", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26977", }, { cve: "CVE-2024-26979", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26979", }, ], notes: [ { category: "general", text: "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26979", url: "https://www.suse.com/security/cve/CVE-2024-26979", }, { category: "external", summary: "SUSE Bug 1223628 for CVE-2024-26979", url: "https://bugzilla.suse.com/1223628", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 0, baseSeverity: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-26979", }, { cve: "CVE-2024-26984", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26984", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnouveau: fix instmem race condition around ptr stores\n\nRunning a lot of VK CTS in parallel against nouveau, once every\nfew hours you might see something like this crash.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000008\nPGD 8000000114e6e067 P4D 8000000114e6e067 PUD 109046067 PMD 0\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 7 PID: 53891 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27\nHardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021\nRIP: 0010:gp100_vmm_pgt_mem+0xe3/0x180 [nouveau]\nCode: c7 48 01 c8 49 89 45 58 85 d2 0f 84 95 00 00 00 41 0f b7 46 12 49 8b 7e 08 89 da 42 8d 2c f8 48 8b 47 08 41 83 c7 01 48 89 ee <48> 8b 40 08 ff d0 0f 1f 00 49 8b 7e 08 48 89 d9 48 8d 75 04 48 c1\nRSP: 0000:ffffac20c5857838 EFLAGS: 00010202\nRAX: 0000000000000000 RBX: 00000000004d8001 RCX: 0000000000000001\nRDX: 00000000004d8001 RSI: 00000000000006d8 RDI: ffffa07afe332180\nRBP: 00000000000006d8 R08: ffffac20c5857ad0 R09: 0000000000ffff10\nR10: 0000000000000001 R11: ffffa07af27e2de0 R12: 000000000000001c\nR13: ffffac20c5857ad0 R14: ffffa07a96fe9040 R15: 000000000000001c\nFS: 00007fe395eed7c0(0000) GS:ffffa07e2c980000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000008 CR3: 000000011febe001 CR4: 00000000003706f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\n...\n\n ? gp100_vmm_pgt_mem+0xe3/0x180 [nouveau]\n ? gp100_vmm_pgt_mem+0x37/0x180 [nouveau]\n nvkm_vmm_iter+0x351/0xa20 [nouveau]\n ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau]\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n ? __lock_acquire+0x3ed/0x2170\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n nvkm_vmm_ptes_get_map+0xc2/0x100 [nouveau]\n ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau]\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n nvkm_vmm_map_locked+0x224/0x3a0 [nouveau]\n\nAdding any sort of useful debug usually makes it go away, so I hand\nwrote the function in a line, and debugged the asm.\n\nEvery so often pt->memory->ptrs is NULL. This ptrs ptr is set in\nthe nv50_instobj_acquire called from nvkm_kmap.\n\nIf Thread A and Thread B both get to nv50_instobj_acquire around\nthe same time, and Thread A hits the refcount_set line, and in\nlockstep thread B succeeds at refcount_inc_not_zero, there is a\nchance the ptrs value won't have been stored since refcount_set\nis unordered. Force a memory barrier here, I picked smp_mb, since\nwe want it on all CPUs and it's write followed by a read.\n\nv2: use paired smp_rmb/smp_wmb.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26984", url: "https://www.suse.com/security/cve/CVE-2024-26984", }, { category: "external", summary: "SUSE Bug 1223633 for CVE-2024-26984", url: "https://bugzilla.suse.com/1223633", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26984", }, { cve: "CVE-2024-26988", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26988", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ninit/main.c: Fix potential static_command_line memory overflow\n\nWe allocate memory of size 'xlen + strlen(boot_command_line) + 1' for\nstatic_command_line, but the strings copied into static_command_line are\nextra_command_line and command_line, rather than extra_command_line and\nboot_command_line.\n\nWhen strlen(command_line) > strlen(boot_command_line), static_command_line\nwill overflow.\n\nThis patch just recovers strlen(command_line) which was miss-consolidated\nwith strlen(boot_command_line) in the commit f5c7310ac73e (\"init/main: add\nchecks for the return value of memblock_alloc*()\")", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26988", url: "https://www.suse.com/security/cve/CVE-2024-26988", }, { category: "external", summary: "SUSE Bug 1223747 for CVE-2024-26988", url: "https://bugzilla.suse.com/1223747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26988", }, { cve: "CVE-2024-26989", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26989", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: hibernate: Fix level3 translation fault in swsusp_save()\n\nOn arm64 machines, swsusp_save() faults if it attempts to access\nMEMBLOCK_NOMAP memory ranges. This can be reproduced in QEMU using UEFI\nwhen booting with rodata=off debug_pagealloc=off and CONFIG_KFENCE=n:\n\n Unable to handle kernel paging request at virtual address ffffff8000000000\n Mem abort info:\n ESR = 0x0000000096000007\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x07: level 3 translation fault\n Data abort info:\n ISV = 0, ISS = 0x00000007, ISS2 = 0x00000000\n CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n swapper pgtable: 4k pages, 39-bit VAs, pgdp=00000000eeb0b000\n [ffffff8000000000] pgd=180000217fff9803, p4d=180000217fff9803, pud=180000217fff9803, pmd=180000217fff8803, pte=0000000000000000\n Internal error: Oops: 0000000096000007 [#1] SMP\n Internal error: Oops: 0000000096000007 [#1] SMP\n Modules linked in: xt_multiport ipt_REJECT nf_reject_ipv4 xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c iptable_filter bpfilter rfkill at803x snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg dwmac_generic stmmac_platform snd_hda_codec stmmac joydev pcs_xpcs snd_hda_core phylink ppdev lp parport ramoops reed_solomon ip_tables x_tables nls_iso8859_1 vfat multipath linear amdgpu amdxcp drm_exec gpu_sched drm_buddy hid_generic usbhid hid radeon video drm_suballoc_helper drm_ttm_helper ttm i2c_algo_bit drm_display_helper cec drm_kms_helper drm\n CPU: 0 PID: 3663 Comm: systemd-sleep Not tainted 6.6.2+ #76\n Source Version: 4e22ed63a0a48e7a7cff9b98b7806d8d4add7dc0\n Hardware name: Greatwall GW-XXXXXX-XXX/GW-XXXXXX-XXX, BIOS KunLun BIOS V4.0 01/19/2021\n pstate: 600003c5 (nZCv DAIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : swsusp_save+0x280/0x538\n lr : swsusp_save+0x280/0x538\n sp : ffffffa034a3fa40\n x29: ffffffa034a3fa40 x28: ffffff8000001000 x27: 0000000000000000\n x26: ffffff8001400000 x25: ffffffc08113e248 x24: 0000000000000000\n x23: 0000000000080000 x22: ffffffc08113e280 x21: 00000000000c69f2\n x20: ffffff8000000000 x19: ffffffc081ae2500 x18: 0000000000000000\n x17: 6666662074736420 x16: 3030303030303030 x15: 3038666666666666\n x14: 0000000000000b69 x13: ffffff9f89088530 x12: 00000000ffffffea\n x11: 00000000ffff7fff x10: 00000000ffff7fff x9 : ffffffc08193f0d0\n x8 : 00000000000bffe8 x7 : c0000000ffff7fff x6 : 0000000000000001\n x5 : ffffffa0fff09dc8 x4 : 0000000000000000 x3 : 0000000000000027\n x2 : 0000000000000000 x1 : 0000000000000000 x0 : 000000000000004e\n Call trace:\n swsusp_save+0x280/0x538\n swsusp_arch_suspend+0x148/0x190\n hibernation_snapshot+0x240/0x39c\n hibernate+0xc4/0x378\n state_store+0xf0/0x10c\n kobj_attr_store+0x14/0x24\n\nThe reason is swsusp_save() -> copy_data_pages() -> page_is_saveable()\n-> kernel_page_present() assuming that a page is always present when\ncan_set_direct_map() is false (all of rodata_full,\ndebug_pagealloc_enabled() and arm64_kfence_can_set_direct_map() false),\nirrespective of the MEMBLOCK_NOMAP ranges. Such MEMBLOCK_NOMAP regions\nshould not be saved during hibernation.\n\nThis problem was introduced by changes to the pfn_valid() logic in\ncommit a7d9f306ba70 (\"arm64: drop pfn_valid_within() and simplify\npfn_valid()\").\n\nSimilar to other architectures, drop the !can_set_direct_map() check in\nkernel_page_present() so that page_is_savable() skips such pages.\n\n[catalin.marinas@arm.com: rework commit message]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26989", url: "https://www.suse.com/security/cve/CVE-2024-26989", }, { category: "external", summary: "SUSE Bug 1223748 for CVE-2024-26989", url: "https://bugzilla.suse.com/1223748", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26989", }, { cve: "CVE-2024-26994", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26994", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nspeakup: Avoid crash on very long word\n\nIn case a console is set up really large and contains a really long word\n(> 256 characters), we have to stop before the length of the word buffer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26994", url: "https://www.suse.com/security/cve/CVE-2024-26994", }, { category: "external", summary: "SUSE Bug 1223750 for CVE-2024-26994", url: "https://bugzilla.suse.com/1223750", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26994", }, { cve: "CVE-2024-26996", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26996", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error\n\nWhen ncm function is working and then stop usb0 interface for link down,\neth_stop() is called. At this piont, accidentally if usb transport error\nshould happen in usb_ep_enable(), 'in_ep' and/or 'out_ep' may not be enabled.\n\nAfter that, ncm_disable() is called to disable for ncm unbind\nbut gether_disconnect() is never called since 'in_ep' is not enabled.\n\nAs the result, ncm object is released in ncm unbind\nbut 'dev->port_usb' associated to 'ncm->port' is not NULL.\n\nAnd when ncm bind again to recover netdev, ncm object is reallocated\nbut usb0 interface is already associated to previous released ncm object.\n\nTherefore, once usb0 interface is up and eth_start_xmit() is called,\nreleased ncm object is dereferrenced and it might cause use-after-free memory.\n\n[function unlink via configfs]\n usb0: eth_stop dev->port_usb=ffffff9b179c3200\n --> error happens in usb_ep_enable().\n NCM: ncm_disable: ncm=ffffff9b179c3200\n --> no gether_disconnect() since ncm->port.in_ep->enabled is false.\n NCM: ncm_unbind: ncm unbind ncm=ffffff9b179c3200\n NCM: ncm_free: ncm free ncm=ffffff9b179c3200 <-- released ncm\n\n[function link via configfs]\n NCM: ncm_alloc: ncm alloc ncm=ffffff9ac4f8a000\n NCM: ncm_bind: ncm bind ncm=ffffff9ac4f8a000\n NCM: ncm_set_alt: ncm=ffffff9ac4f8a000 alt=0\n usb0: eth_open dev->port_usb=ffffff9b179c3200 <-- previous released ncm\n usb0: eth_start dev->port_usb=ffffff9b179c3200 <--\n eth_start_xmit()\n --> dev->wrap()\n Unable to handle kernel paging request at virtual address dead00000000014f\n\nThis patch addresses the issue by checking if 'ncm->netdev' is not NULL at\nncm_disable() to call gether_disconnect() to deassociate 'dev->port_usb'.\nIt's more reasonable to check 'ncm->netdev' to call gether_connect/disconnect\nrather than check 'ncm->port.in_ep->enabled' since it might not be enabled\nbut the gether connection might be established.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26996", url: "https://www.suse.com/security/cve/CVE-2024-26996", }, { category: "external", summary: "SUSE Bug 1223752 for CVE-2024-26996", url: "https://bugzilla.suse.com/1223752", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26996", }, { cve: "CVE-2024-26997", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26997", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc2: host: Fix dereference issue in DDMA completion flow.\n\nFixed variable dereference issue in DDMA completion flow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26997", url: "https://www.suse.com/security/cve/CVE-2024-26997", }, { category: "external", summary: "SUSE Bug 1223741 for CVE-2024-26997", url: "https://bugzilla.suse.com/1223741", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26997", }, { cve: "CVE-2024-26999", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26999", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nserial/pmac_zilog: Remove flawed mitigation for rx irq flood\n\nThe mitigation was intended to stop the irq completely. That may be\nbetter than a hard lock-up but it turns out that you get a crash anyway\nif you're using pmac_zilog as a serial console:\n\nttyPZ0: pmz: rx irq flood !\nBUG: spinlock recursion on CPU#0, swapper/0\n\nThat's because the pr_err() call in pmz_receive_chars() results in\npmz_console_write() attempting to lock a spinlock already locked in\npmz_interrupt(). With CONFIG_DEBUG_SPINLOCK=y, this produces a fatal\nBUG splat. The spinlock in question is the one in struct uart_port.\n\nEven when it's not fatal, the serial port rx function ceases to work.\nAlso, the iteration limit doesn't play nicely with QEMU, as can be\nseen in the bug report linked below.\n\nA web search for other reports of the error message \"pmz: rx irq flood\"\ndidn't produce anything. So I don't think this code is needed any more.\nRemove it.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26999", url: "https://www.suse.com/security/cve/CVE-2024-26999", }, { category: "external", summary: "SUSE Bug 1223754 for CVE-2024-26999", url: "https://bugzilla.suse.com/1223754", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-26999", }, { cve: "CVE-2024-27000", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27000", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: mxs-auart: add spinlock around changing cts state\n\nThe uart_handle_cts_change() function in serial_core expects the caller\nto hold uport->lock. For example, I have seen the below kernel splat,\nwhen the Bluetooth driver is loaded on an i.MX28 board.\n\n [ 85.119255] ------------[ cut here ]------------\n [ 85.124413] WARNING: CPU: 0 PID: 27 at /drivers/tty/serial/serial_core.c:3453 uart_handle_cts_change+0xb4/0xec\n [ 85.134694] Modules linked in: hci_uart bluetooth ecdh_generic ecc wlcore_sdio configfs\n [ 85.143314] CPU: 0 PID: 27 Comm: kworker/u3:0 Not tainted 6.6.3-00021-gd62a2f068f92 #1\n [ 85.151396] Hardware name: Freescale MXS (Device Tree)\n [ 85.156679] Workqueue: hci0 hci_power_on [bluetooth]\n (...)\n [ 85.191765] uart_handle_cts_change from mxs_auart_irq_handle+0x380/0x3f4\n [ 85.198787] mxs_auart_irq_handle from __handle_irq_event_percpu+0x88/0x210\n (...)", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27000", url: "https://www.suse.com/security/cve/CVE-2024-27000", }, { category: "external", summary: "SUSE Bug 1223757 for CVE-2024-27000", url: "https://bugzilla.suse.com/1223757", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-27000", }, { cve: "CVE-2024-27001", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27001", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: vmk80xx: fix incomplete endpoint checking\n\nWhile vmk80xx does have endpoint checking implemented, some things\ncan fall through the cracks. Depending on the hardware model,\nURBs can have either bulk or interrupt type, and current version\nof vmk80xx_find_usb_endpoints() function does not take that fully\ninto account. While this warning does not seem to be too harmful,\nat the very least it will crash systems with 'panic_on_warn' set on\nthem.\n\nFix the issue found by Syzkaller [1] by somewhat simplifying the\nendpoint checking process with usb_find_common_endpoints() and\nensuring that only expected endpoint types are present.\n\nThis patch has not been tested on real hardware.\n\n[1] Syzkaller report:\nusb 1-1: BOGUS urb xfer, pipe 1 != type 3\nWARNING: CPU: 0 PID: 781 at drivers/usb/core/urb.c:504 usb_submit_urb+0xc4e/0x18c0 drivers/usb/core/urb.c:503\n...\nCall Trace:\n <TASK>\n usb_start_wait_urb+0x113/0x520 drivers/usb/core/message.c:59\n vmk80xx_reset_device drivers/comedi/drivers/vmk80xx.c:227 [inline]\n vmk80xx_auto_attach+0xa1c/0x1a40 drivers/comedi/drivers/vmk80xx.c:818\n comedi_auto_config+0x238/0x380 drivers/comedi/drivers.c:1067\n usb_probe_interface+0x5cd/0xb00 drivers/usb/core/driver.c:399\n...\n\nSimilar issue also found by Syzkaller:", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27001", url: "https://www.suse.com/security/cve/CVE-2024-27001", }, { category: "external", summary: "SUSE Bug 1223698 for CVE-2024-27001", url: "https://bugzilla.suse.com/1223698", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27001", }, { cve: "CVE-2024-27004", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27004", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: Get runtime PM before walking tree during disable_unused\n\nDoug reported [1] the following hung task:\n\n INFO: task swapper/0:1 blocked for more than 122 seconds.\n Not tainted 5.15.149-21875-gf795ebc40eb8 #1\n \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n task:swapper/0 state:D stack: 0 pid: 1 ppid: 0 flags:0x00000008\n Call trace:\n __switch_to+0xf4/0x1f4\n __schedule+0x418/0xb80\n schedule+0x5c/0x10c\n rpm_resume+0xe0/0x52c\n rpm_resume+0x178/0x52c\n __pm_runtime_resume+0x58/0x98\n clk_pm_runtime_get+0x30/0xb0\n clk_disable_unused_subtree+0x58/0x208\n clk_disable_unused_subtree+0x38/0x208\n clk_disable_unused_subtree+0x38/0x208\n clk_disable_unused_subtree+0x38/0x208\n clk_disable_unused_subtree+0x38/0x208\n clk_disable_unused+0x4c/0xe4\n do_one_initcall+0xcc/0x2d8\n do_initcall_level+0xa4/0x148\n do_initcalls+0x5c/0x9c\n do_basic_setup+0x24/0x30\n kernel_init_freeable+0xec/0x164\n kernel_init+0x28/0x120\n ret_from_fork+0x10/0x20\n INFO: task kworker/u16:0:9 blocked for more than 122 seconds.\n Not tainted 5.15.149-21875-gf795ebc40eb8 #1\n \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n task:kworker/u16:0 state:D stack: 0 pid: 9 ppid: 2 flags:0x00000008\n Workqueue: events_unbound deferred_probe_work_func\n Call trace:\n __switch_to+0xf4/0x1f4\n __schedule+0x418/0xb80\n schedule+0x5c/0x10c\n schedule_preempt_disabled+0x2c/0x48\n __mutex_lock+0x238/0x488\n __mutex_lock_slowpath+0x1c/0x28\n mutex_lock+0x50/0x74\n clk_prepare_lock+0x7c/0x9c\n clk_core_prepare_lock+0x20/0x44\n clk_prepare+0x24/0x30\n clk_bulk_prepare+0x40/0xb0\n mdss_runtime_resume+0x54/0x1c8\n pm_generic_runtime_resume+0x30/0x44\n __genpd_runtime_resume+0x68/0x7c\n genpd_runtime_resume+0x108/0x1f4\n __rpm_callback+0x84/0x144\n rpm_callback+0x30/0x88\n rpm_resume+0x1f4/0x52c\n rpm_resume+0x178/0x52c\n __pm_runtime_resume+0x58/0x98\n __device_attach+0xe0/0x170\n device_initial_probe+0x1c/0x28\n bus_probe_device+0x3c/0x9c\n device_add+0x644/0x814\n mipi_dsi_device_register_full+0xe4/0x170\n devm_mipi_dsi_device_register_full+0x28/0x70\n ti_sn_bridge_probe+0x1dc/0x2c0\n auxiliary_bus_probe+0x4c/0x94\n really_probe+0xcc/0x2c8\n __driver_probe_device+0xa8/0x130\n driver_probe_device+0x48/0x110\n __device_attach_driver+0xa4/0xcc\n bus_for_each_drv+0x8c/0xd8\n __device_attach+0xf8/0x170\n device_initial_probe+0x1c/0x28\n bus_probe_device+0x3c/0x9c\n deferred_probe_work_func+0x9c/0xd8\n process_one_work+0x148/0x518\n worker_thread+0x138/0x350\n kthread+0x138/0x1e0\n ret_from_fork+0x10/0x20\n\nThe first thread is walking the clk tree and calling\nclk_pm_runtime_get() to power on devices required to read the clk\nhardware via struct clk_ops::is_enabled(). This thread holds the clk\nprepare_lock, and is trying to runtime PM resume a device, when it finds\nthat the device is in the process of resuming so the thread schedule()s\naway waiting for the device to finish resuming before continuing. The\nsecond thread is runtime PM resuming the same device, but the runtime\nresume callback is calling clk_prepare(), trying to grab the\nprepare_lock waiting on the first thread.\n\nThis is a classic ABBA deadlock. To properly fix the deadlock, we must\nnever runtime PM resume or suspend a device with the clk prepare_lock\nheld. Actually doing that is near impossible today because the global\nprepare_lock would have to be dropped in the middle of the tree, the\ndevice runtime PM resumed/suspended, and then the prepare_lock grabbed\nagain to ensure consistency of the clk tree topology. If anything\nchanges with the clk tree in the meantime, we've lost and will need to\nstart the operation all over again.\n\nLuckily, most of the time we're simply incrementing or decrementing the\nruntime PM count on an active device, so we don't have the chance to\nschedule away with the prepare_lock held. Let's fix this immediate\nproblem that can be\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27004", url: "https://www.suse.com/security/cve/CVE-2024-27004", }, { category: "external", summary: "SUSE Bug 1223762 for CVE-2024-27004", url: "https://bugzilla.suse.com/1223762", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-27004", }, { cve: "CVE-2024-27008", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27008", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: nv04: Fix out of bounds access\n\nWhen Output Resource (dcb->or) value is assigned in\nfabricate_dcb_output(), there may be out of bounds access to\ndac_users array in case dcb->or is zero because ffs(dcb->or) is\nused as index there.\nThe 'or' argument of fabricate_dcb_output() must be interpreted as a\nnumber of bit to set, not value.\n\nUtilize macros from 'enum nouveau_or' in calls instead of hardcoding.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27008", url: "https://www.suse.com/security/cve/CVE-2024-27008", }, { category: "external", summary: "SUSE Bug 1223802 for CVE-2024-27008", url: "https://bugzilla.suse.com/1223802", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27008", }, { cve: "CVE-2024-27028", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27028", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: spi-mt65xx: Fix NULL pointer access in interrupt handler\n\nThe TX buffer in spi_transfer can be a NULL pointer, so the interrupt\nhandler may end up writing to the invalid memory and cause crashes.\n\nAdd a check to trans->tx_buf before using it.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27028", url: "https://www.suse.com/security/cve/CVE-2024-27028", }, { category: "external", summary: "SUSE Bug 1223788 for CVE-2024-27028", url: "https://bugzilla.suse.com/1223788", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27028", }, { cve: "CVE-2024-27037", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27037", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: zynq: Prevent null pointer dereference caused by kmalloc failure\n\nThe kmalloc() in zynq_clk_setup() will return null if the\nphysical memory has run out. As a result, if we use snprintf()\nto write data to the null address, the null pointer dereference\nbug will happen.\n\nThis patch uses a stack variable to replace the kmalloc().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27037", url: "https://www.suse.com/security/cve/CVE-2024-27037", }, { category: "external", summary: "SUSE Bug 1223717 for CVE-2024-27037", url: "https://bugzilla.suse.com/1223717", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27037", }, { cve: "CVE-2024-27042", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27042", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()'\n\nThe issue arises when the array 'adev->vcn.vcn_config' is accessed\nbefore checking if the index 'adev->vcn.num_vcn_inst' is within the\nbounds of the array.\n\nThe fix involves moving the bounds check before the array access. This\nensures that 'adev->vcn.num_vcn_inst' is within the bounds of the array\nbefore it is used as an index.\n\nFixes the below:\ndrivers/gpu/drm/amd/amdgpu/amdgpu_discovery.c:1289 amdgpu_discovery_reg_base_init() error: testing array offset 'adev->vcn.num_vcn_inst' after use.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27042", url: "https://www.suse.com/security/cve/CVE-2024-27042", }, { category: "external", summary: "SUSE Bug 1223823 for CVE-2024-27042", url: "https://bugzilla.suse.com/1223823", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27042", }, { cve: "CVE-2024-27045", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27045", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()'\n\nTell snprintf() to store at most 10 bytes in the output buffer\ninstead of 30.\n\nFixes the below:\ndrivers/gpu/drm/amd/amdgpu/../display/amdgpu_dm/amdgpu_dm_debugfs.c:1508 dp_dsc_clock_en_read() error: snprintf() is printing too much 30 vs 10", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27045", url: "https://www.suse.com/security/cve/CVE-2024-27045", }, { category: "external", summary: "SUSE Bug 1223826 for CVE-2024-27045", url: "https://bugzilla.suse.com/1223826", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27045", }, { cve: "CVE-2024-27047", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27047", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: phy: fix phy_get_internal_delay accessing an empty array\n\nThe phy_get_internal_delay function could try to access to an empty\narray in the case that the driver is calling phy_get_internal_delay\nwithout defining delay_values and rx-internal-delay-ps or\ntx-internal-delay-ps is defined to 0 in the device-tree.\nThis will lead to \"unable to handle kernel NULL pointer dereference at\nvirtual address 0\". To avoid this kernel oops, the test should be delay\n>= 0. As there is already delay < 0 test just before, the test could\nonly be size == 0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27047", url: "https://www.suse.com/security/cve/CVE-2024-27047", }, { category: "external", summary: "SUSE Bug 1223828 for CVE-2024-27047", url: "https://bugzilla.suse.com/1223828", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27047", }, { cve: "CVE-2024-27051", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27051", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value\n\ncpufreq_cpu_get may return NULL. To avoid NULL-dereference check it\nand return 0 in case of error.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27051", url: "https://www.suse.com/security/cve/CVE-2024-27051", }, { category: "external", summary: "SUSE Bug 1223769 for CVE-2024-27051", url: "https://bugzilla.suse.com/1223769", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27051", }, { cve: "CVE-2024-27052", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27052", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work\n\nThe workqueue might still be running, when the driver is stopped. To\navoid a use-after-free, call cancel_work_sync() in rtl8xxxu_stop().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27052", url: "https://www.suse.com/security/cve/CVE-2024-27052", }, { category: "external", summary: "SUSE Bug 1223829 for CVE-2024-27052", url: "https://bugzilla.suse.com/1223829", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27052", }, { cve: "CVE-2024-27053", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27053", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wilc1000: fix RCU usage in connect path\n\nWith lockdep enabled, calls to the connect function from cfg802.11 layer\nlead to the following warning:\n\n=============================\nWARNING: suspicious RCU usage\n6.7.0-rc1-wt+ #333 Not tainted\n-----------------------------\ndrivers/net/wireless/microchip/wilc1000/hif.c:386\nsuspicious rcu_dereference_check() usage!\n[...]\nstack backtrace:\nCPU: 0 PID: 100 Comm: wpa_supplicant Not tainted 6.7.0-rc1-wt+ #333\nHardware name: Atmel SAMA5\n unwind_backtrace from show_stack+0x18/0x1c\n show_stack from dump_stack_lvl+0x34/0x48\n dump_stack_lvl from wilc_parse_join_bss_param+0x7dc/0x7f4\n wilc_parse_join_bss_param from connect+0x2c4/0x648\n connect from cfg80211_connect+0x30c/0xb74\n cfg80211_connect from nl80211_connect+0x860/0xa94\n nl80211_connect from genl_rcv_msg+0x3fc/0x59c\n genl_rcv_msg from netlink_rcv_skb+0xd0/0x1f8\n netlink_rcv_skb from genl_rcv+0x2c/0x3c\n genl_rcv from netlink_unicast+0x3b0/0x550\n netlink_unicast from netlink_sendmsg+0x368/0x688\n netlink_sendmsg from ____sys_sendmsg+0x190/0x430\n ____sys_sendmsg from ___sys_sendmsg+0x110/0x158\n ___sys_sendmsg from sys_sendmsg+0xe8/0x150\n sys_sendmsg from ret_fast_syscall+0x0/0x1c\n\nThis warning is emitted because in the connect path, when trying to parse\ntarget BSS parameters, we dereference a RCU pointer whithout being in RCU\ncritical section.\nFix RCU dereference usage by moving it to a RCU read critical section. To\navoid wrapping the whole wilc_parse_join_bss_param under the critical\nsection, just use the critical section to copy ies data", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27053", url: "https://www.suse.com/security/cve/CVE-2024-27053", }, { category: "external", summary: "SUSE Bug 1223737 for CVE-2024-27053", url: "https://bugzilla.suse.com/1223737", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-27053", }, { cve: "CVE-2024-27054", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27054", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: fix double module refcount decrement\n\nOnce the discipline is associated with the device, deleting the device\ntakes care of decrementing the module's refcount. Doing it manually on\nthis error path causes refcount to artificially decrease on each error\nwhile it should just stay the same.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27054", url: "https://www.suse.com/security/cve/CVE-2024-27054", }, { category: "external", summary: "SUSE Bug 1223819 for CVE-2024-27054", url: "https://bugzilla.suse.com/1223819", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27054", }, { cve: "CVE-2024-27059", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27059", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: usb-storage: Prevent divide-by-0 error in isd200_ata_command\n\nThe isd200 sub-driver in usb-storage uses the HEADS and SECTORS values\nin the ATA ID information to calculate cylinder and head values when\ncreating a CDB for READ or WRITE commands. The calculation involves\ndivision and modulus operations, which will cause a crash if either of\nthese values is 0. While this never happens with a genuine device, it\ncould happen with a flawed or subversive emulation, as reported by the\nsyzbot fuzzer.\n\nProtect against this possibility by refusing to bind to the device if\neither the ATA_ID_HEADS or ATA_ID_SECTORS value in the device's ID\ninformation is 0. This requires isd200_Initialization() to return a\nnegative error code when initialization fails; currently it always\nreturns 0 (even when there is an error).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27059", url: "https://www.suse.com/security/cve/CVE-2024-27059", }, { category: "external", summary: "SUSE Bug 1223738 for CVE-2024-27059", url: "https://bugzilla.suse.com/1223738", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27059", }, { cve: "CVE-2024-27072", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27072", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: usbtv: Remove useless locks in usbtv_video_free()\n\nRemove locks calls in usbtv_video_free() because\nare useless and may led to a deadlock as reported here:\nhttps://syzkaller.appspot.com/x/bisect.txt?x=166dc872180000\nAlso remove usbtv_stop() call since it will be called when\nunregistering the device.\n\nBefore 'c838530d230b' this issue would only be noticed if you\ndisconnect while streaming and now it is noticeable even when\ndisconnecting while not streaming.\n\n\n[hverkuil: fix minor spelling mistake in log message]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27072", url: "https://www.suse.com/security/cve/CVE-2024-27072", }, { category: "external", summary: "SUSE Bug 1223837 for CVE-2024-27072", url: "https://bugzilla.suse.com/1223837", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27072", }, { cve: "CVE-2024-27073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27073", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: ttpci: fix two memleaks in budget_av_attach\n\nWhen saa7146_register_device and saa7146_vv_init fails, budget_av_attach\nshould free the resources it allocates, like the error-handling of\nttpci_budget_init does. Besides, there are two fixme comment refers to\nsuch deallocations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27073", url: "https://www.suse.com/security/cve/CVE-2024-27073", }, { category: "external", summary: "SUSE Bug 1223843 for CVE-2024-27073", url: "https://bugzilla.suse.com/1223843", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27073", }, { cve: "CVE-2024-27074", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27074", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: go7007: fix a memleak in go7007_load_encoder\n\nIn go7007_load_encoder, bounce(i.e. go->boot_fw), is allocated without\na deallocation thereafter. After the following call chain:\n\nsaa7134_go7007_init\n |-> go7007_boot_encoder\n |-> go7007_load_encoder\n |-> kfree(go)\n\ngo is freed and thus bounce is leaked.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27074", url: "https://www.suse.com/security/cve/CVE-2024-27074", }, { category: "external", summary: "SUSE Bug 1223844 for CVE-2024-27074", url: "https://bugzilla.suse.com/1223844", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27074", }, { cve: "CVE-2024-27075", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27075", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvb-frontends: avoid stack overflow warnings with clang\n\nA previous patch worked around a KASAN issue in stv0367, now a similar\nproblem showed up with clang:\n\ndrivers/media/dvb-frontends/stv0367.c:1222:12: error: stack frame size (3624) exceeds limit (2048) in 'stv0367ter_set_frontend' [-Werror,-Wframe-larger-than]\n 1214 | static int stv0367ter_set_frontend(struct dvb_frontend *fe)\n\nRework the stv0367_writereg() function to be simpler and mark both\nregister access functions as noinline_for_stack so the temporary\ni2c_msg structures do not get duplicated on the stack when KASAN_STACK\nis enabled.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27075", url: "https://www.suse.com/security/cve/CVE-2024-27075", }, { category: "external", summary: "SUSE Bug 1223842 for CVE-2024-27075", url: "https://bugzilla.suse.com/1223842", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27075", }, { cve: "CVE-2024-27076", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27076", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: imx: csc/scaler: fix v4l2_ctrl_handler memory leak\n\nFree the memory allocated in v4l2_ctrl_handler_init on release.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27076", url: "https://www.suse.com/security/cve/CVE-2024-27076", }, { category: "external", summary: "SUSE Bug 1223779 for CVE-2024-27076", url: "https://bugzilla.suse.com/1223779", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27076", }, { cve: "CVE-2024-27077", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27077", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity\n\nThe entity->name (i.e. name) is allocated in v4l2_m2m_register_entity\nbut isn't freed in its following error-handling paths. This patch\nadds such deallocation to prevent memleak of entity->name.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27077", url: "https://www.suse.com/security/cve/CVE-2024-27077", }, { category: "external", summary: "SUSE Bug 1223780 for CVE-2024-27077", url: "https://bugzilla.suse.com/1223780", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27077", }, { cve: "CVE-2024-27078", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27078", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-tpg: fix some memleaks in tpg_alloc\n\nIn tpg_alloc, resources should be deallocated in each and every\nerror-handling paths, since they are allocated in for statements.\nOtherwise there would be memleaks because tpg_free is called only when\ntpg_alloc return 0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27078", url: "https://www.suse.com/security/cve/CVE-2024-27078", }, { category: "external", summary: "SUSE Bug 1223781 for CVE-2024-27078", url: "https://bugzilla.suse.com/1223781", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27078", }, { cve: "CVE-2024-27388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27388", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: fix some memleaks in gssx_dec_option_array\n\nThe creds and oa->data need to be freed in the error-handling paths after\ntheir allocation. So this patch add these deallocations in the\ncorresponding paths.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27388", url: "https://www.suse.com/security/cve/CVE-2024-27388", }, { category: "external", summary: "SUSE Bug 1223744 for CVE-2024-27388", url: "https://bugzilla.suse.com/1223744", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27388", }, { cve: "CVE-2024-27393", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27393", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nxen-netfront: Add missing skb_mark_for_recycle\n\nNotice that skb_mark_for_recycle() is introduced later than fixes tag in\ncommit 6a5bcd84e886 (\"page_pool: Allow drivers to hint on SKB recycling\").\n\nIt is believed that fixes tag were missing a call to page_pool_release_page()\nbetween v5.9 to v5.14, after which is should have used skb_mark_for_recycle().\nSince v6.6 the call page_pool_release_page() were removed (in\ncommit 535b9c61bdef (\"net: page_pool: hide page_pool_release_page()\")\nand remaining callers converted (in commit 6bfef2ec0172 (\"Merge branch\n'net-page_pool-remove-page_pool_release_page'\")).\n\nThis leak became visible in v6.8 via commit dba1b8a7ab68 (\"mm/page_pool: catch\npage_pool memory leaks\").", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27393", url: "https://www.suse.com/security/cve/CVE-2024-27393", }, { category: "external", summary: "SUSE Bug 1224076 for CVE-2024-27393", url: "https://bugzilla.suse.com/1224076", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27393", }, { cve: "CVE-2024-27395", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27395", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: Fix Use-After-Free in ovs_ct_exit\n\nSince kfree_rcu, which is called in the hlist_for_each_entry_rcu traversal\nof ovs_ct_limit_exit, is not part of the RCU read critical section, it\nis possible that the RCU grace period will pass during the traversal and\nthe key will be free.\n\nTo prevent this, it should be changed to hlist_for_each_entry_safe.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27395", url: "https://www.suse.com/security/cve/CVE-2024-27395", }, { category: "external", summary: "SUSE Bug 1224098 for CVE-2024-27395", url: "https://bugzilla.suse.com/1224098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27395", }, { cve: "CVE-2024-27396", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27396", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: gtp: Fix Use-After-Free in gtp_dellink\n\nSince call_rcu, which is called in the hlist_for_each_entry_rcu traversal\nof gtp_dellink, is not part of the RCU read critical section, it\nis possible that the RCU grace period will pass during the traversal and\nthe key will be free.\n\nTo prevent this, it should be changed to hlist_for_each_entry_safe.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27396", url: "https://www.suse.com/security/cve/CVE-2024-27396", }, { category: "external", summary: "SUSE Bug 1224096 for CVE-2024-27396", url: "https://bugzilla.suse.com/1224096", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27396", }, { cve: "CVE-2024-27398", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27398", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix use-after-free bugs caused by sco_sock_timeout\n\nWhen the sco connection is established and then, the sco socket\nis releasing, timeout_work will be scheduled to judge whether\nthe sco disconnection is timeout. The sock will be deallocated\nlater, but it is dereferenced again in sco_sock_timeout. As a\nresult, the use-after-free bugs will happen. The root cause is\nshown below:\n\n Cleanup Thread | Worker Thread\nsco_sock_release |\n sco_sock_close |\n __sco_sock_close |\n sco_sock_set_timer |\n schedule_delayed_work |\n sco_sock_kill | (wait a time)\n sock_put(sk) //FREE | sco_sock_timeout\n | sock_hold(sk) //USE\n\nThe KASAN report triggered by POC is shown below:\n\n[ 95.890016] ==================================================================\n[ 95.890496] BUG: KASAN: slab-use-after-free in sco_sock_timeout+0x5e/0x1c0\n[ 95.890755] Write of size 4 at addr ffff88800c388080 by task kworker/0:0/7\n...\n[ 95.890755] Workqueue: events sco_sock_timeout\n[ 95.890755] Call Trace:\n[ 95.890755] <TASK>\n[ 95.890755] dump_stack_lvl+0x45/0x110\n[ 95.890755] print_address_description+0x78/0x390\n[ 95.890755] print_report+0x11b/0x250\n[ 95.890755] ? __virt_addr_valid+0xbe/0xf0\n[ 95.890755] ? sco_sock_timeout+0x5e/0x1c0\n[ 95.890755] kasan_report+0x139/0x170\n[ 95.890755] ? update_load_avg+0xe5/0x9f0\n[ 95.890755] ? sco_sock_timeout+0x5e/0x1c0\n[ 95.890755] kasan_check_range+0x2c3/0x2e0\n[ 95.890755] sco_sock_timeout+0x5e/0x1c0\n[ 95.890755] process_one_work+0x561/0xc50\n[ 95.890755] worker_thread+0xab2/0x13c0\n[ 95.890755] ? pr_cont_work+0x490/0x490\n[ 95.890755] kthread+0x279/0x300\n[ 95.890755] ? pr_cont_work+0x490/0x490\n[ 95.890755] ? kthread_blkcg+0xa0/0xa0\n[ 95.890755] ret_from_fork+0x34/0x60\n[ 95.890755] ? kthread_blkcg+0xa0/0xa0\n[ 95.890755] ret_from_fork_asm+0x11/0x20\n[ 95.890755] </TASK>\n[ 95.890755]\n[ 95.890755] Allocated by task 506:\n[ 95.890755] kasan_save_track+0x3f/0x70\n[ 95.890755] __kasan_kmalloc+0x86/0x90\n[ 95.890755] __kmalloc+0x17f/0x360\n[ 95.890755] sk_prot_alloc+0xe1/0x1a0\n[ 95.890755] sk_alloc+0x31/0x4e0\n[ 95.890755] bt_sock_alloc+0x2b/0x2a0\n[ 95.890755] sco_sock_create+0xad/0x320\n[ 95.890755] bt_sock_create+0x145/0x320\n[ 95.890755] __sock_create+0x2e1/0x650\n[ 95.890755] __sys_socket+0xd0/0x280\n[ 95.890755] __x64_sys_socket+0x75/0x80\n[ 95.890755] do_syscall_64+0xc4/0x1b0\n[ 95.890755] entry_SYSCALL_64_after_hwframe+0x67/0x6f\n[ 95.890755]\n[ 95.890755] Freed by task 506:\n[ 95.890755] kasan_save_track+0x3f/0x70\n[ 95.890755] kasan_save_free_info+0x40/0x50\n[ 95.890755] poison_slab_object+0x118/0x180\n[ 95.890755] __kasan_slab_free+0x12/0x30\n[ 95.890755] kfree+0xb2/0x240\n[ 95.890755] __sk_destruct+0x317/0x410\n[ 95.890755] sco_sock_release+0x232/0x280\n[ 95.890755] sock_close+0xb2/0x210\n[ 95.890755] __fput+0x37f/0x770\n[ 95.890755] task_work_run+0x1ae/0x210\n[ 95.890755] get_signal+0xe17/0xf70\n[ 95.890755] arch_do_signal_or_restart+0x3f/0x520\n[ 95.890755] syscall_exit_to_user_mode+0x55/0x120\n[ 95.890755] do_syscall_64+0xd1/0x1b0\n[ 95.890755] entry_SYSCALL_64_after_hwframe+0x67/0x6f\n[ 95.890755]\n[ 95.890755] The buggy address belongs to the object at ffff88800c388000\n[ 95.890755] which belongs to the cache kmalloc-1k of size 1024\n[ 95.890755] The buggy address is located 128 bytes inside of\n[ 95.890755] freed 1024-byte region [ffff88800c388000, ffff88800c388400)\n[ 95.890755]\n[ 95.890755] The buggy address belongs to the physical page:\n[ 95.890755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800c38a800 pfn:0xc388\n[ 95.890755] head: order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 95.890755] ano\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27398", url: "https://www.suse.com/security/cve/CVE-2024-27398", }, { category: "external", summary: "SUSE Bug 1224174 for CVE-2024-27398", url: "https://bugzilla.suse.com/1224174", }, { category: "external", summary: "SUSE Bug 1225013 for CVE-2024-27398", url: "https://bugzilla.suse.com/1225013", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2024-27398", }, { cve: "CVE-2024-27399", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27399", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout\n\nThere is a race condition between l2cap_chan_timeout() and\nl2cap_chan_del(). When we use l2cap_chan_del() to delete the\nchannel, the chan->conn will be set to null. But the conn could\nbe dereferenced again in the mutex_lock() of l2cap_chan_timeout().\nAs a result the null pointer dereference bug will happen. The\nKASAN report triggered by POC is shown below:\n\n[ 472.074580] ==================================================================\n[ 472.075284] BUG: KASAN: null-ptr-deref in mutex_lock+0x68/0xc0\n[ 472.075308] Write of size 8 at addr 0000000000000158 by task kworker/0:0/7\n[ 472.075308]\n[ 472.075308] CPU: 0 PID: 7 Comm: kworker/0:0 Not tainted 6.9.0-rc5-00356-g78c0094a146b #36\n[ 472.075308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu4\n[ 472.075308] Workqueue: events l2cap_chan_timeout\n[ 472.075308] Call Trace:\n[ 472.075308] <TASK>\n[ 472.075308] dump_stack_lvl+0x137/0x1a0\n[ 472.075308] print_report+0x101/0x250\n[ 472.075308] ? __virt_addr_valid+0x77/0x160\n[ 472.075308] ? mutex_lock+0x68/0xc0\n[ 472.075308] kasan_report+0x139/0x170\n[ 472.075308] ? mutex_lock+0x68/0xc0\n[ 472.075308] kasan_check_range+0x2c3/0x2e0\n[ 472.075308] mutex_lock+0x68/0xc0\n[ 472.075308] l2cap_chan_timeout+0x181/0x300\n[ 472.075308] process_one_work+0x5d2/0xe00\n[ 472.075308] worker_thread+0xe1d/0x1660\n[ 472.075308] ? pr_cont_work+0x5e0/0x5e0\n[ 472.075308] kthread+0x2b7/0x350\n[ 472.075308] ? pr_cont_work+0x5e0/0x5e0\n[ 472.075308] ? kthread_blkcg+0xd0/0xd0\n[ 472.075308] ret_from_fork+0x4d/0x80\n[ 472.075308] ? kthread_blkcg+0xd0/0xd0\n[ 472.075308] ret_from_fork_asm+0x11/0x20\n[ 472.075308] </TASK>\n[ 472.075308] ==================================================================\n[ 472.094860] Disabling lock debugging due to kernel taint\n[ 472.096136] BUG: kernel NULL pointer dereference, address: 0000000000000158\n[ 472.096136] #PF: supervisor write access in kernel mode\n[ 472.096136] #PF: error_code(0x0002) - not-present page\n[ 472.096136] PGD 0 P4D 0\n[ 472.096136] Oops: 0002 [#1] PREEMPT SMP KASAN NOPTI\n[ 472.096136] CPU: 0 PID: 7 Comm: kworker/0:0 Tainted: G B 6.9.0-rc5-00356-g78c0094a146b #36\n[ 472.096136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu4\n[ 472.096136] Workqueue: events l2cap_chan_timeout\n[ 472.096136] RIP: 0010:mutex_lock+0x88/0xc0\n[ 472.096136] Code: be 08 00 00 00 e8 f8 23 1f fd 4c 89 f7 be 08 00 00 00 e8 eb 23 1f fd 42 80 3c 23 00 74 08 48 88\n[ 472.096136] RSP: 0018:ffff88800744fc78 EFLAGS: 00000246\n[ 472.096136] RAX: 0000000000000000 RBX: 1ffff11000e89f8f RCX: ffffffff8457c865\n[ 472.096136] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff88800744fc78\n[ 472.096136] RBP: 0000000000000158 R08: ffff88800744fc7f R09: 1ffff11000e89f8f\n[ 472.096136] R10: dffffc0000000000 R11: ffffed1000e89f90 R12: dffffc0000000000\n[ 472.096136] R13: 0000000000000158 R14: ffff88800744fc78 R15: ffff888007405a00\n[ 472.096136] FS: 0000000000000000(0000) GS:ffff88806d200000(0000) knlGS:0000000000000000\n[ 472.096136] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 472.096136] CR2: 0000000000000158 CR3: 000000000da32000 CR4: 00000000000006f0\n[ 472.096136] Call Trace:\n[ 472.096136] <TASK>\n[ 472.096136] ? __die_body+0x8d/0xe0\n[ 472.096136] ? page_fault_oops+0x6b8/0x9a0\n[ 472.096136] ? kernelmode_fixup_or_oops+0x20c/0x2a0\n[ 472.096136] ? do_user_addr_fault+0x1027/0x1340\n[ 472.096136] ? _printk+0x7a/0xa0\n[ 472.096136] ? mutex_lock+0x68/0xc0\n[ 472.096136] ? add_taint+0x42/0xd0\n[ 472.096136] ? exc_page_fault+0x6a/0x1b0\n[ 472.096136] ? asm_exc_page_fault+0x26/0x30\n[ 472.096136] ? mutex_lock+0x75/0xc0\n[ 472.096136] ? mutex_lock+0x88/0xc0\n[ 472.096136] ? mutex_lock+0x75/0xc0\n[ 472.096136] l2cap_chan_timeo\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27399", url: "https://www.suse.com/security/cve/CVE-2024-27399", }, { category: "external", summary: "SUSE Bug 1224177 for CVE-2024-27399", url: "https://bugzilla.suse.com/1224177", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27399", }, { cve: "CVE-2024-27400", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27400", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2\n\nThis reverts drm/amdgpu: fix ftrace event amdgpu_bo_move always move\non same heap. The basic problem here is that after the move the old\nlocation is simply not available any more.\n\nSome fixes were suggested, but essentially we should call the move\nnotification before actually moving things because only this way we have\nthe correct order for DMA-buf and VM move notifications as well.\n\nAlso rework the statistic handling so that we don't update the eviction\ncounter before the move.\n\nv2: add missing NULL check", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27400", url: "https://www.suse.com/security/cve/CVE-2024-27400", }, { category: "external", summary: "SUSE Bug 1224180 for CVE-2024-27400", url: "https://bugzilla.suse.com/1224180", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27400", }, { cve: "CVE-2024-27401", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27401", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nfirewire: nosy: ensure user_length is taken into account when fetching packet contents\n\nEnsure that packet_buffer_get respects the user_length provided. If\nthe length of the head packet exceeds the user_length, packet_buffer_get\nwill now return 0 to signify to the user that no data were read\nand a larger buffer size is required. Helps prevent user space overflows.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27401", url: "https://www.suse.com/security/cve/CVE-2024-27401", }, { category: "external", summary: "SUSE Bug 1224181 for CVE-2024-27401", url: "https://bugzilla.suse.com/1224181", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27401", }, { cve: "CVE-2024-27405", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27405", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: ncm: Avoid dropping datagrams of properly parsed NTBs\n\nIt is observed sometimes when tethering is used over NCM with Windows 11\nas host, at some instances, the gadget_giveback has one byte appended at\nthe end of a proper NTB. When the NTB is parsed, unwrap call looks for\nany leftover bytes in SKB provided by u_ether and if there are any pending\nbytes, it treats them as a separate NTB and parses it. But in case the\nsecond NTB (as per unwrap call) is faulty/corrupt, all the datagrams that\nwere parsed properly in the first NTB and saved in rx_list are dropped.\n\nAdding a few custom traces showed the following:\n[002] d..1 7828.532866: dwc3_gadget_giveback: ep1out:\nreq 000000003868811a length 1025/16384 zsI ==> 0\n[002] d..1 7828.532867: ncm_unwrap_ntb: K: ncm_unwrap_ntb toprocess: 1025\n[002] d..1 7828.532867: ncm_unwrap_ntb: K: ncm_unwrap_ntb nth: 1751999342\n[002] d..1 7828.532868: ncm_unwrap_ntb: K: ncm_unwrap_ntb seq: 0xce67\n[002] d..1 7828.532868: ncm_unwrap_ntb: K: ncm_unwrap_ntb blk_len: 0x400\n[002] d..1 7828.532868: ncm_unwrap_ntb: K: ncm_unwrap_ntb ndp_len: 0x10\n[002] d..1 7828.532869: ncm_unwrap_ntb: K: Parsed NTB with 1 frames\n\nIn this case, the giveback is of 1025 bytes and block length is 1024.\nThe rest 1 byte (which is 0x00) won't be parsed resulting in drop of\nall datagrams in rx_list.\n\nSame is case with packets of size 2048:\n[002] d..1 7828.557948: dwc3_gadget_giveback: ep1out:\nreq 0000000011dfd96e length 2049/16384 zsI ==> 0\n[002] d..1 7828.557949: ncm_unwrap_ntb: K: ncm_unwrap_ntb nth: 1751999342\n[002] d..1 7828.557950: ncm_unwrap_ntb: K: ncm_unwrap_ntb blk_len: 0x800\n\nLecroy shows one byte coming in extra confirming that the byte is coming\nin from PC:\n\n Transfer 2959 - Bytes Transferred(1025) Timestamp((18.524 843 590)\n - Transaction 8391 - Data(1025 bytes) Timestamp(18.524 843 590)\n --- Packet 4063861\n Data(1024 bytes)\n Duration(2.117us) Idle(14.700ns) Timestamp(18.524 843 590)\n --- Packet 4063863\n Data(1 byte)\n Duration(66.160ns) Time(282.000ns) Timestamp(18.524 845 722)\n\nAccording to Windows driver, no ZLP is needed if wBlockLength is non-zero,\nbecause the non-zero wBlockLength has already told the function side the\nsize of transfer to be expected. However, there are in-market NCM devices\nthat rely on ZLP as long as the wBlockLength is multiple of wMaxPacketSize.\nTo deal with such devices, it pads an extra 0 at end so the transfer is no\nlonger multiple of wMaxPacketSize.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27405", url: "https://www.suse.com/security/cve/CVE-2024-27405", }, { category: "external", summary: "SUSE Bug 1224423 for CVE-2024-27405", url: "https://bugzilla.suse.com/1224423", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-27405", }, { cve: "CVE-2024-27410", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27410", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: nl80211: reject iftype change with mesh ID change\n\nIt's currently possible to change the mesh ID when the\ninterface isn't yet in mesh mode, at the same time as\nchanging it into mesh mode. This leads to an overwrite\nof data in the wdev->u union for the interface type it\ncurrently has, causing cfg80211_change_iface() to do\nwrong things when switching.\n\nWe could probably allow setting an interface to mesh\nwhile setting the mesh ID at the same time by doing a\ndifferent order of operations here, but realistically\nthere's no userspace that's going to do this, so just\ndisallow changes in iftype when setting mesh ID.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27410", url: "https://www.suse.com/security/cve/CVE-2024-27410", }, { category: "external", summary: "SUSE Bug 1224432 for CVE-2024-27410", url: "https://bugzilla.suse.com/1224432", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27410", }, { cve: "CVE-2024-27412", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27412", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\npower: supply: bq27xxx-i2c: Do not free non existing IRQ\n\nThe bq27xxx i2c-client may not have an IRQ, in which case\nclient->irq will be 0. bq27xxx_battery_i2c_probe() already has\nan if (client->irq) check wrapping the request_threaded_irq().\n\nBut bq27xxx_battery_i2c_remove() unconditionally calls\nfree_irq(client->irq) leading to:\n\n[ 190.310742] ------------[ cut here ]------------\n[ 190.310843] Trying to free already-free IRQ 0\n[ 190.310861] WARNING: CPU: 2 PID: 1304 at kernel/irq/manage.c:1893 free_irq+0x1b8/0x310\n\nFollowed by a backtrace when unbinding the driver. Add\nan if (client->irq) to bq27xxx_battery_i2c_remove() mirroring\nprobe() to fix this.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27412", url: "https://www.suse.com/security/cve/CVE-2024-27412", }, { category: "external", summary: "SUSE Bug 1224437 for CVE-2024-27412", url: "https://bugzilla.suse.com/1224437", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27412", }, { cve: "CVE-2024-27413", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27413", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nefi/capsule-loader: fix incorrect allocation size\n\ngcc-14 notices that the allocation with sizeof(void) on 32-bit architectures\nis not enough for a 64-bit phys_addr_t:\n\ndrivers/firmware/efi/capsule-loader.c: In function 'efi_capsule_open':\ndrivers/firmware/efi/capsule-loader.c:295:24: error: allocation of insufficient size '4' for type 'phys_addr_t' {aka 'long long unsigned int'} with size '8' [-Werror=alloc-size]\n 295 | cap_info->phys = kzalloc(sizeof(void *), GFP_KERNEL);\n | ^\n\nUse the correct type instead here.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27413", url: "https://www.suse.com/security/cve/CVE-2024-27413", }, { category: "external", summary: "SUSE Bug 1224438 for CVE-2024-27413", url: "https://bugzilla.suse.com/1224438", }, { category: "external", summary: "SUSE Bug 1225315 for CVE-2024-27413", url: "https://bugzilla.suse.com/1225315", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27413", }, { cve: "CVE-2024-27416", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27416", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST\n\nIf we received HCI_EV_IO_CAPA_REQUEST while\nHCI_OP_READ_REMOTE_EXT_FEATURES is yet to be responded assume the remote\ndoes support SSP since otherwise this event shouldn't be generated.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27416", url: "https://www.suse.com/security/cve/CVE-2024-27416", }, { category: "external", summary: "SUSE Bug 1224723 for CVE-2024-27416", url: "https://bugzilla.suse.com/1224723", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27416", }, { cve: "CVE-2024-27417", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27417", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fix potential \"struct net\" leak in inet6_rtm_getaddr()\n\nIt seems that if userspace provides a correct IFA_TARGET_NETNSID value\nbut no IFA_ADDRESS and IFA_LOCAL attributes, inet6_rtm_getaddr()\nreturns -EINVAL with an elevated \"struct net\" refcount.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27417", url: "https://www.suse.com/security/cve/CVE-2024-27417", }, { category: "external", summary: "SUSE Bug 1224721 for CVE-2024-27417", url: "https://bugzilla.suse.com/1224721", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27417", }, { cve: "CVE-2024-27419", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27419", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix data-races around sysctl_net_busy_read\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27419", url: "https://www.suse.com/security/cve/CVE-2024-27419", }, { category: "external", summary: "SUSE Bug 1224759 for CVE-2024-27419", url: "https://bugzilla.suse.com/1224759", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-27419", }, { cve: "CVE-2024-27431", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27431", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncpumap: Zero-initialise xdp_rxq_info struct before running XDP program\n\nWhen running an XDP program that is attached to a cpumap entry, we don't\ninitialise the xdp_rxq_info data structure being used in the xdp_buff\nthat backs the XDP program invocation. Tobias noticed that this leads to\nrandom values being returned as the xdp_md->rx_queue_index value for XDP\nprograms running in a cpumap.\n\nThis means we're basically returning the contents of the uninitialised\nmemory, which is bad. Fix this by zero-initialising the rxq data\nstructure before running the XDP program.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27431", url: "https://www.suse.com/security/cve/CVE-2024-27431", }, { category: "external", summary: "SUSE Bug 1224718 for CVE-2024-27431", url: "https://bugzilla.suse.com/1224718", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27431", }, { cve: "CVE-2024-27435", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27435", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme: fix reconnection fail due to reserved tag allocation\n\nWe found a issue on production environment while using NVMe over RDMA,\nadmin_q reconnect failed forever while remote target and network is ok.\nAfter dig into it, we found it may caused by a ABBA deadlock due to tag\nallocation. In my case, the tag was hold by a keep alive request\nwaiting inside admin_q, as we quiesced admin_q while reset ctrl, so the\nrequest maked as idle and will not process before reset success. As\nfabric_q shares tagset with admin_q, while reconnect remote target, we\nneed a tag for connect command, but the only one reserved tag was held\nby keep alive command which waiting inside admin_q. As a result, we\nfailed to reconnect admin_q forever. In order to fix this issue, I\nthink we should keep two reserved tags for admin queue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27435", url: "https://www.suse.com/security/cve/CVE-2024-27435", }, { category: "external", summary: "SUSE Bug 1224717 for CVE-2024-27435", url: "https://bugzilla.suse.com/1224717", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27435", }, { cve: "CVE-2024-27436", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-27436", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Stop parsing channels bits when all channels are found.\n\nIf a usb audio device sets more bits than the amount of channels\nit could write outside of the map array.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-27436", url: "https://www.suse.com/security/cve/CVE-2024-27436", }, { category: "external", summary: "SUSE Bug 1224803 for CVE-2024-27436", url: "https://bugzilla.suse.com/1224803", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-27436", }, { cve: "CVE-2024-35789", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35789", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes\n\nWhen moving a station out of a VLAN and deleting the VLAN afterwards, the\nfast_rx entry still holds a pointer to the VLAN's netdev, which can cause\nuse-after-free bugs. Fix this by immediately calling ieee80211_check_fast_rx\nafter the VLAN change.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35789", url: "https://www.suse.com/security/cve/CVE-2024-35789", }, { category: "external", summary: "SUSE Bug 1224749 for CVE-2024-35789", url: "https://bugzilla.suse.com/1224749", }, { category: "external", summary: "SUSE Bug 1227320 for CVE-2024-35789", url: "https://bugzilla.suse.com/1227320", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2024-35789", }, { cve: "CVE-2024-35791", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35791", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()\n\nDo the cache flush of converted pages in svm_register_enc_region() before\ndropping kvm->lock to fix use-after-free issues where region and/or its\narray of pages could be freed by a different task, e.g. if userspace has\n__unregister_enc_region_locked() already queued up for the region.\n\nNote, the \"obvious\" alternative of using local variables doesn't fully\nresolve the bug, as region->pages is also dynamically allocated. I.e. the\nregion structure itself would be fine, but region->pages could be freed.\n\nFlushing multiple pages under kvm->lock is unfortunate, but the entire\nflow is a rare slow path, and the manual flush is only needed on CPUs that\nlack coherency for encrypted memory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35791", url: "https://www.suse.com/security/cve/CVE-2024-35791", }, { category: "external", summary: "SUSE Bug 1224725 for CVE-2024-35791", url: "https://bugzilla.suse.com/1224725", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35791", }, { cve: "CVE-2024-35796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35796", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ll_temac: platform_get_resource replaced by wrong function\n\nThe function platform_get_resource was replaced with\ndevm_platform_ioremap_resource_byname and is called using 0 as name.\n\nThis eventually ends up in platform_get_resource_byname in the call\nstack, where it causes a null pointer in strcmp.\n\n\tif (type == resource_type(r) && !strcmp(r->name, name))\n\nIt should have been replaced with devm_platform_ioremap_resource.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35796", url: "https://www.suse.com/security/cve/CVE-2024-35796", }, { category: "external", summary: "SUSE Bug 1224615 for CVE-2024-35796", url: "https://bugzilla.suse.com/1224615", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35796", }, { cve: "CVE-2024-35799", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35799", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Prevent crash when disable stream\n\n[Why]\nDisabling stream encoder invokes a function that no longer exists.\n\n[How]\nCheck if the function declaration is NULL in disable stream encoder.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35799", url: "https://www.suse.com/security/cve/CVE-2024-35799", }, { category: "external", summary: "SUSE Bug 1224740 for CVE-2024-35799", url: "https://bugzilla.suse.com/1224740", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35799", }, { cve: "CVE-2024-35801", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35801", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/fpu: Keep xfd_state in sync with MSR_IA32_XFD\n\nCommit 672365477ae8 (\"x86/fpu: Update XFD state where required\") and\ncommit 8bf26758ca96 (\"x86/fpu: Add XFD state to fpstate\") introduced a\nper CPU variable xfd_state to keep the MSR_IA32_XFD value cached, in\norder to avoid unnecessary writes to the MSR.\n\nOn CPU hotplug MSR_IA32_XFD is reset to the init_fpstate.xfd, which\nwipes out any stale state. But the per CPU cached xfd value is not\nreset, which brings them out of sync.\n\nAs a consequence a subsequent xfd_update_state() might fail to update\nthe MSR which in turn can result in XRSTOR raising a #NM in kernel\nspace, which crashes the kernel.\n\nTo fix this, introduce xfd_set_state() to write xfd_state together\nwith MSR_IA32_XFD, and use it in all places that set MSR_IA32_XFD.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35801", url: "https://www.suse.com/security/cve/CVE-2024-35801", }, { category: "external", summary: "SUSE Bug 1224732 for CVE-2024-35801", url: "https://bugzilla.suse.com/1224732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35801", }, { cve: "CVE-2024-35804", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35804", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Mark target gfn of emulated atomic instruction as dirty\n\nWhen emulating an atomic access on behalf of the guest, mark the target\ngfn dirty if the CMPXCHG by KVM is attempted and doesn't fault. This\nfixes a bug where KVM effectively corrupts guest memory during live\nmigration by writing to guest memory without informing userspace that the\npage is dirty.\n\nMarking the page dirty got unintentionally dropped when KVM's emulated\nCMPXCHG was converted to do a user access. Before that, KVM explicitly\nmapped the guest page into kernel memory, and marked the page dirty during\nthe unmap phase.\n\nMark the page dirty even if the CMPXCHG fails, as the old data is written\nback on failure, i.e. the page is still written. The value written is\nguaranteed to be the same because the operation is atomic, but KVM's ABI\nis that all writes are dirty logged regardless of the value written. And\nmore importantly, that's what KVM did before the buggy commit.\n\nHuge kudos to the folks on the Cc list (and many others), who did all the\nactual work of triaging and debugging.\n\nbase-commit: 6769ea8da8a93ed4630f1ce64df6aafcaabfce64", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35804", url: "https://www.suse.com/security/cve/CVE-2024-35804", }, { category: "external", summary: "SUSE Bug 1224638 for CVE-2024-35804", url: "https://bugzilla.suse.com/1224638", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35804", }, { cve: "CVE-2024-35806", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35806", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: fsl: qbman: Always disable interrupts when taking cgr_lock\n\nsmp_call_function_single disables IRQs when executing the callback. To\nprevent deadlocks, we must disable IRQs when taking cgr_lock elsewhere.\nThis is already done by qman_update_cgr and qman_delete_cgr; fix the\nother lockers.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35806", url: "https://www.suse.com/security/cve/CVE-2024-35806", }, { category: "external", summary: "SUSE Bug 1224699 for CVE-2024-35806", url: "https://bugzilla.suse.com/1224699", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35806", }, { cve: "CVE-2024-35809", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35809", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/PM: Drain runtime-idle callbacks before driver removal\n\nA race condition between the .runtime_idle() callback and the .remove()\ncallback in the rtsx_pcr PCI driver leads to a kernel crash due to an\nunhandled page fault [1].\n\nThe problem is that rtsx_pci_runtime_idle() is not expected to be running\nafter pm_runtime_get_sync() has been called, but the latter doesn't really\nguarantee that. It only guarantees that the suspend and resume callbacks\nwill not be running when it returns.\n\nHowever, if a .runtime_idle() callback is already running when\npm_runtime_get_sync() is called, the latter will notice that the runtime PM\nstatus of the device is RPM_ACTIVE and it will return right away without\nwaiting for the former to complete. In fact, it cannot wait for\n.runtime_idle() to complete because it may be called from that callback (it\narguably does not make much sense to do that, but it is not strictly\nprohibited).\n\nThus in general, whoever is providing a .runtime_idle() callback needs\nto protect it from running in parallel with whatever code runs after\npm_runtime_get_sync(). [Note that .runtime_idle() will not start after\npm_runtime_get_sync() has returned, but it may continue running then if it\nhas started earlier.]\n\nOne way to address that race condition is to call pm_runtime_barrier()\nafter pm_runtime_get_sync() (not before it, because a nonzero value of the\nruntime PM usage counter is necessary to prevent runtime PM callbacks from\nbeing invoked) to wait for the .runtime_idle() callback to complete should\nit be running at that point. A suitable place for doing that is in\npci_device_remove() which calls pm_runtime_get_sync() before removing the\ndriver, so it may as well call pm_runtime_barrier() subsequently, which\nwill prevent the race in question from occurring, not just in the rtsx_pcr\ndriver, but in any PCI drivers providing .runtime_idle() callbacks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35809", url: "https://www.suse.com/security/cve/CVE-2024-35809", }, { category: "external", summary: "SUSE Bug 1224738 for CVE-2024-35809", url: "https://bugzilla.suse.com/1224738", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35809", }, { cve: "CVE-2024-35811", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35811", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach\n\nThis is the candidate patch of CVE-2023-47233 :\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-47233\n\nIn brcm80211 driver,it starts with the following invoking chain\nto start init a timeout worker:\n\n->brcmf_usb_probe\n ->brcmf_usb_probe_cb\n ->brcmf_attach\n ->brcmf_bus_started\n ->brcmf_cfg80211_attach\n ->wl_init_priv\n ->brcmf_init_escan\n ->INIT_WORK(&cfg->escan_timeout_work,\n\t\t brcmf_cfg80211_escan_timeout_worker);\n\nIf we disconnect the USB by hotplug, it will call\nbrcmf_usb_disconnect to make cleanup. The invoking chain is :\n\nbrcmf_usb_disconnect\n ->brcmf_usb_disconnect_cb\n ->brcmf_detach\n ->brcmf_cfg80211_detach\n ->kfree(cfg);\n\nWhile the timeout woker may still be running. This will cause\na use-after-free bug on cfg in brcmf_cfg80211_escan_timeout_worker.\n\nFix it by deleting the timer and canceling the worker in\nbrcmf_cfg80211_detach.\n\n[arend.vanspriel@broadcom.com: keep timer delete as is and cancel work just before free]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35811", url: "https://www.suse.com/security/cve/CVE-2024-35811", }, { category: "external", summary: "SUSE Bug 1224592 for CVE-2024-35811", url: "https://bugzilla.suse.com/1224592", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35811", }, { cve: "CVE-2024-35812", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35812", }, ], notes: [ { category: "general", text: "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35812", url: "https://www.suse.com/security/cve/CVE-2024-35812", }, { category: "external", summary: "SUSE Bug 1224624 for CVE-2024-35812", url: "https://bugzilla.suse.com/1224624", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35812", }, { cve: "CVE-2024-35813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35813", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: core: Avoid negative index with array access\n\nCommit 4d0c8d0aef63 (\"mmc: core: Use mrq.sbc in close-ended ffu\") assigns\nprev_idata = idatas[i - 1], but doesn't check that the iterator i is\ngreater than zero. Let's fix this by adding a check.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35813", url: "https://www.suse.com/security/cve/CVE-2024-35813", }, { category: "external", summary: "SUSE Bug 1224618 for CVE-2024-35813", url: "https://bugzilla.suse.com/1224618", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35813", }, { cve: "CVE-2024-35815", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35815", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion\n\nThe first kiocb_set_cancel_fn() argument may point at a struct kiocb\nthat is not embedded inside struct aio_kiocb. With the current code,\ndepending on the compiler, the req->ki_ctx read happens either before\nthe IOCB_AIO_RW test or after that test. Move the req->ki_ctx read such\nthat it is guaranteed that the IOCB_AIO_RW test happens first.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35815", url: "https://www.suse.com/security/cve/CVE-2024-35815", }, { category: "external", summary: "SUSE Bug 1224685 for CVE-2024-35815", url: "https://bugzilla.suse.com/1224685", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35815", }, { cve: "CVE-2024-35817", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35817", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag\n\nOtherwise after the GTT bo is released, the GTT and gart space is freed\nbut amdgpu_ttm_backend_unbind will not clear the gart page table entry\nand leave valid mapping entry pointing to the stale system page. Then\nif GPU access the gart address mistakely, it will read undefined value\ninstead page fault, harder to debug and reproduce the real issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35817", url: "https://www.suse.com/security/cve/CVE-2024-35817", }, { category: "external", summary: "SUSE Bug 1224736 for CVE-2024-35817", url: "https://bugzilla.suse.com/1224736", }, { category: "external", summary: "SUSE Bug 1225313 for CVE-2024-35817", url: "https://bugzilla.suse.com/1225313", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2024-35817", }, { cve: "CVE-2024-35821", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35821", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nubifs: Set page uptodate in the correct place\n\nPage cache reads are lockless, so setting the freshly allocated page\nuptodate before we've overwritten it with the data it's supposed to have\nin it will allow a simultaneous reader to see old data. Move the call\nto SetPageUptodate into ubifs_write_end(), which is after we copied the\nnew data into the page.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35821", url: "https://www.suse.com/security/cve/CVE-2024-35821", }, { category: "external", summary: "SUSE Bug 1224629 for CVE-2024-35821", url: "https://bugzilla.suse.com/1224629", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35821", }, { cve: "CVE-2024-35822", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35822", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: udc: remove warning when queue disabled ep\n\nIt is possible trigger below warning message from mass storage function,\n\nWARNING: CPU: 6 PID: 3839 at drivers/usb/gadget/udc/core.c:294 usb_ep_queue+0x7c/0x104\npc : usb_ep_queue+0x7c/0x104\nlr : fsg_main_thread+0x494/0x1b3c\n\nRoot cause is mass storage function try to queue request from main thread,\nbut other thread may already disable ep when function disable.\n\nAs there is no function failure in the driver, in order to avoid effort\nto fix warning, change WARN_ON_ONCE() in usb_ep_queue() to pr_debug().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35822", url: "https://www.suse.com/security/cve/CVE-2024-35822", }, { category: "external", summary: "SUSE Bug 1224739 for CVE-2024-35822", url: "https://bugzilla.suse.com/1224739", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-35822", }, { cve: "CVE-2024-35823", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35823", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nvt: fix unicode buffer corruption when deleting characters\n\nThis is the same issue that was fixed for the VGA text buffer in commit\n39cdb68c64d8 (\"vt: fix memory overlapping when deleting chars in the\nbuffer\"). The cure is also the same i.e. replace memcpy() with memmove()\ndue to the overlaping buffers.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35823", url: "https://www.suse.com/security/cve/CVE-2024-35823", }, { category: "external", summary: "SUSE Bug 1224692 for CVE-2024-35823", url: "https://bugzilla.suse.com/1224692", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35823", }, { cve: "CVE-2024-35825", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35825", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: ncm: Fix handling of zero block length packets\n\nWhile connecting to a Linux host with CDC_NCM_NTB_DEF_SIZE_TX\nset to 65536, it has been observed that we receive short packets,\nwhich come at interval of 5-10 seconds sometimes and have block\nlength zero but still contain 1-2 valid datagrams present.\n\nAccording to the NCM spec:\n\n\"If wBlockLength = 0x0000, the block is terminated by a\nshort packet. In this case, the USB transfer must still\nbe shorter than dwNtbInMaxSize or dwNtbOutMaxSize. If\nexactly dwNtbInMaxSize or dwNtbOutMaxSize bytes are sent,\nand the size is a multiple of wMaxPacketSize for the\ngiven pipe, then no ZLP shall be sent.\n\nwBlockLength= 0x0000 must be used with extreme care, because\nof the possibility that the host and device may get out of\nsync, and because of test issues.\n\nwBlockLength = 0x0000 allows the sender to reduce latency by\nstarting to send a very large NTB, and then shortening it when\nthe sender discovers that there's not sufficient data to justify\nsending a large NTB\"\n\nHowever, there is a potential issue with the current implementation,\nas it checks for the occurrence of multiple NTBs in a single\ngiveback by verifying if the leftover bytes to be processed is zero\nor not. If the block length reads zero, we would process the same\nNTB infintely because the leftover bytes is never zero and it leads\nto a crash. Fix this by bailing out if block length reads zero.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35825", url: "https://www.suse.com/security/cve/CVE-2024-35825", }, { category: "external", summary: "SUSE Bug 1224681 for CVE-2024-35825", url: "https://bugzilla.suse.com/1224681", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35825", }, { cve: "CVE-2024-35828", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35828", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer()\n\nIn the for statement of lbs_allocate_cmd_buffer(), if the allocation of\ncmdarray[i].cmdbuf fails, both cmdarray and cmdarray[i].cmdbuf needs to\nbe freed. Otherwise, there will be memleaks in lbs_allocate_cmd_buffer().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35828", url: "https://www.suse.com/security/cve/CVE-2024-35828", }, { category: "external", summary: "SUSE Bug 1224622 for CVE-2024-35828", url: "https://bugzilla.suse.com/1224622", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35828", }, { cve: "CVE-2024-35829", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35829", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/lima: fix a memleak in lima_heap_alloc\n\nWhen lima_vm_map_bo fails, the resources need to be deallocated, or\nthere will be memleaks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35829", url: "https://www.suse.com/security/cve/CVE-2024-35829", }, { category: "external", summary: "SUSE Bug 1224707 for CVE-2024-35829", url: "https://bugzilla.suse.com/1224707", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35829", }, { cve: "CVE-2024-35830", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35830", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: tc358743: register v4l2 async device only after successful setup\n\nEnsure the device has been setup correctly before registering the v4l2\nasync device, thus allowing userspace to access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35830", url: "https://www.suse.com/security/cve/CVE-2024-35830", }, { category: "external", summary: "SUSE Bug 1224680 for CVE-2024-35830", url: "https://bugzilla.suse.com/1224680", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35830", }, { cve: "CVE-2024-35833", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35833", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: fsl-qdma: Fix a memory leak related to the queue command DMA\n\nThis dma_alloc_coherent() is undone neither in the remove function, nor in\nthe error handling path of fsl_qdma_probe().\n\nSwitch to the managed version to fix both issues.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35833", url: "https://www.suse.com/security/cve/CVE-2024-35833", }, { category: "external", summary: "SUSE Bug 1224632 for CVE-2024-35833", url: "https://bugzilla.suse.com/1224632", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35833", }, { cve: "CVE-2024-35845", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35845", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: dbg-tlv: ensure NUL termination\n\nThe iwl_fw_ini_debug_info_tlv is used as a string, so we must\nensure the string is terminated correctly before using it.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35845", url: "https://www.suse.com/security/cve/CVE-2024-35845", }, { category: "external", summary: "SUSE Bug 1224731 for CVE-2024-35845", url: "https://bugzilla.suse.com/1224731", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35845", }, { cve: "CVE-2024-35847", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35847", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/gic-v3-its: Prevent double free on error\n\nThe error handling path in its_vpe_irq_domain_alloc() causes a double free\nwhen its_vpe_init() fails after successfully allocating at least one\ninterrupt. This happens because its_vpe_irq_domain_free() frees the\ninterrupts along with the area bitmap and the vprop_page and\nits_vpe_irq_domain_alloc() subsequently frees the area bitmap and the\nvprop_page again.\n\nFix this by unconditionally invoking its_vpe_irq_domain_free() which\nhandles all cases correctly and by removing the bitmap/vprop_page freeing\nfrom its_vpe_irq_domain_alloc().\n\n[ tglx: Massaged change log ]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35847", url: "https://www.suse.com/security/cve/CVE-2024-35847", }, { category: "external", summary: "SUSE Bug 1224697 for CVE-2024-35847", url: "https://bugzilla.suse.com/1224697", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35847", }, { cve: "CVE-2024-35849", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35849", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix information leak in btrfs_ioctl_logical_to_ino()\n\nSyzbot reported the following information leak for in\nbtrfs_ioctl_logical_to_ino():\n\n BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n BUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x110 lib/usercopy.c:40\n instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n _copy_to_user+0xbc/0x110 lib/usercopy.c:40\n copy_to_user include/linux/uaccess.h:191 [inline]\n btrfs_ioctl_logical_to_ino+0x440/0x750 fs/btrfs/ioctl.c:3499\n btrfs_ioctl+0x714/0x1260\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:904 [inline]\n __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890\n __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890\n x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\n Uninit was created at:\n __kmalloc_large_node+0x231/0x370 mm/slub.c:3921\n __do_kmalloc_node mm/slub.c:3954 [inline]\n __kmalloc_node+0xb07/0x1060 mm/slub.c:3973\n kmalloc_node include/linux/slab.h:648 [inline]\n kvmalloc_node+0xc0/0x2d0 mm/util.c:634\n kvmalloc include/linux/slab.h:766 [inline]\n init_data_container+0x49/0x1e0 fs/btrfs/backref.c:2779\n btrfs_ioctl_logical_to_ino+0x17c/0x750 fs/btrfs/ioctl.c:3480\n btrfs_ioctl+0x714/0x1260\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:904 [inline]\n __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890\n __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890\n x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\n Bytes 40-65535 of 65536 are uninitialized\n Memory access of size 65536 starts at ffff888045a40000\n\nThis happens, because we're copying a 'struct btrfs_data_container' back\nto user-space. This btrfs_data_container is allocated in\n'init_data_container()' via kvmalloc(), which does not zero-fill the\nmemory.\n\nFix this by using kvzalloc() which zeroes out the memory on allocation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35849", url: "https://www.suse.com/security/cve/CVE-2024-35849", }, { category: "external", summary: "SUSE Bug 1224733 for CVE-2024-35849", url: "https://bugzilla.suse.com/1224733", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35849", }, { cve: "CVE-2024-35851", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35851", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: qca: fix NULL-deref on non-serdev suspend\n\nQualcomm ROME controllers can be registered from the Bluetooth line\ndiscipline and in this case the HCI UART serdev pointer is NULL.\n\nAdd the missing sanity check to prevent a NULL-pointer dereference when\nwakeup() is called for a non-serdev controller during suspend.\n\nJust return true for now to restore the original behaviour and address\nthe crash with pre-6.2 kernels, which do not have commit e9b3e5b8c657\n(\"Bluetooth: hci_qca: only assign wakeup with serial port support\") that\ncauses the crash to happen already at setup() time.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35851", url: "https://www.suse.com/security/cve/CVE-2024-35851", }, { category: "external", summary: "SUSE Bug 1224509 for CVE-2024-35851", url: "https://bugzilla.suse.com/1224509", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35851", }, { cve: "CVE-2024-35852", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35852", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work\n\nThe rehash delayed work is rescheduled with a delay if the number of\ncredits at end of the work is not negative as supposedly it means that\nthe migration ended. Otherwise, it is rescheduled immediately.\n\nAfter \"mlxsw: spectrum_acl_tcam: Fix possible use-after-free during\nrehash\" the above is no longer accurate as a non-negative number of\ncredits is no longer indicative of the migration being done. It can also\nhappen if the work encountered an error in which case the migration will\nresume the next time the work is scheduled.\n\nThe significance of the above is that it is possible for the work to be\npending and associated with hints that were allocated when the migration\nstarted. This leads to the hints being leaked [1] when the work is\ncanceled while pending as part of ACL region dismantle.\n\nFix by freeing the hints if hints are associated with a work that was\ncanceled while pending.\n\nBlame the original commit since the reliance on not having a pending\nwork associated with hints is fragile.\n\n[1]\nunreferenced object 0xffff88810e7c3000 (size 256):\n comm \"kworker/0:16\", pid 176, jiffies 4295460353\n hex dump (first 32 bytes):\n 00 30 95 11 81 88 ff ff 61 00 00 00 00 00 00 80 .0......a.......\n 00 00 61 00 40 00 00 00 00 00 00 00 04 00 00 00 ..a.@...........\n backtrace (crc 2544ddb9):\n [<00000000cf8cfab3>] kmalloc_trace+0x23f/0x2a0\n [<000000004d9a1ad9>] objagg_hints_get+0x42/0x390\n [<000000000b143cf3>] mlxsw_sp_acl_erp_rehash_hints_get+0xca/0x400\n [<0000000059bdb60a>] mlxsw_sp_acl_tcam_vregion_rehash_work+0x868/0x1160\n [<00000000e81fd734>] process_one_work+0x59c/0xf20\n [<00000000ceee9e81>] worker_thread+0x799/0x12c0\n [<00000000bda6fe39>] kthread+0x246/0x300\n [<0000000070056d23>] ret_from_fork+0x34/0x70\n [<00000000dea2b93e>] ret_from_fork_asm+0x1a/0x30", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35852", url: "https://www.suse.com/security/cve/CVE-2024-35852", }, { category: "external", summary: "SUSE Bug 1224502 for CVE-2024-35852", url: "https://bugzilla.suse.com/1224502", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35852", }, { cve: "CVE-2024-35854", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35854", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash\n\nThe rehash delayed work migrates filters from one region to another\naccording to the number of available credits.\n\nThe migrated from region is destroyed at the end of the work if the\nnumber of credits is non-negative as the assumption is that this is\nindicative of migration being complete. This assumption is incorrect as\na non-negative number of credits can also be the result of a failed\nmigration.\n\nThe destruction of a region that still has filters referencing it can\nresult in a use-after-free [1].\n\nFix by not destroying the region if migration failed.\n\n[1]\nBUG: KASAN: slab-use-after-free in mlxsw_sp_acl_ctcam_region_entry_remove+0x21d/0x230\nRead of size 8 at addr ffff8881735319e8 by task kworker/0:31/3858\n\nCPU: 0 PID: 3858 Comm: kworker/0:31 Tainted: G W 6.9.0-rc2-custom-00782-gf2275c2157d8 #5\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work\nCall Trace:\n <TASK>\n dump_stack_lvl+0xc6/0x120\n print_report+0xce/0x670\n kasan_report+0xd7/0x110\n mlxsw_sp_acl_ctcam_region_entry_remove+0x21d/0x230\n mlxsw_sp_acl_ctcam_entry_del+0x2e/0x70\n mlxsw_sp_acl_atcam_entry_del+0x81/0x210\n mlxsw_sp_acl_tcam_vchunk_migrate_all+0x3cd/0xb50\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n </TASK>\n\nAllocated by task 174:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x8f/0xa0\n __kmalloc+0x19c/0x360\n mlxsw_sp_acl_tcam_region_create+0xdf/0x9c0\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x954/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 7:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3b/0x60\n poison_slab_object+0x102/0x170\n __kasan_slab_free+0x14/0x30\n kfree+0xc1/0x290\n mlxsw_sp_acl_tcam_region_destroy+0x272/0x310\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x731/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35854", url: "https://www.suse.com/security/cve/CVE-2024-35854", }, { category: "external", summary: "SUSE Bug 1224636 for CVE-2024-35854", url: "https://bugzilla.suse.com/1224636", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35854", }, { cve: "CVE-2024-35860", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35860", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: support deferring bpf_link dealloc to after RCU grace period\n\nBPF link for some program types is passed as a \"context\" which can be\nused by those BPF programs to look up additional information. E.g., for\nmulti-kprobes and multi-uprobes, link is used to fetch BPF cookie values.\n\nBecause of this runtime dependency, when bpf_link refcnt drops to zero\nthere could still be active BPF programs running accessing link data.\n\nThis patch adds generic support to defer bpf_link dealloc callback to\nafter RCU GP, if requested. This is done by exposing two different\ndeallocation callbacks, one synchronous and one deferred. If deferred\none is provided, bpf_link_free() will schedule dealloc_deferred()\ncallback to happen after RCU GP.\n\nBPF is using two flavors of RCU: \"classic\" non-sleepable one and RCU\ntasks trace one. The latter is used when sleepable BPF programs are\nused. bpf_link_free() accommodates that by checking underlying BPF\nprogram's sleepable flag, and goes either through normal RCU GP only for\nnon-sleepable, or through RCU tasks trace GP *and* then normal RCU GP\n(taking into account rcu_trace_implies_rcu_gp() optimization), if BPF\nprogram is sleepable.\n\nWe use this for multi-kprobe and multi-uprobe links, which dereference\nlink during program run. We also preventively switch raw_tp link to use\ndeferred dealloc callback, as upcoming changes in bpf-next tree expose\nraw_tp link data (specifically, cookie value) to BPF program at runtime\nas well.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35860", url: "https://www.suse.com/security/cve/CVE-2024-35860", }, { category: "external", summary: "SUSE Bug 1224531 for CVE-2024-35860", url: "https://bugzilla.suse.com/1224531", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35860", }, { cve: "CVE-2024-35861", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35861", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35861", url: "https://www.suse.com/security/cve/CVE-2024-35861", }, { category: "external", summary: "SUSE Bug 1224766 for CVE-2024-35861", url: "https://bugzilla.suse.com/1224766", }, { category: "external", summary: "SUSE Bug 1225312 for CVE-2024-35861", url: "https://bugzilla.suse.com/1225312", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2024-35861", }, { cve: "CVE-2024-35862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35862", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in smb2_is_network_name_deleted()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35862", url: "https://www.suse.com/security/cve/CVE-2024-35862", }, { category: "external", summary: "SUSE Bug 1224764 for CVE-2024-35862", url: "https://bugzilla.suse.com/1224764", }, { category: "external", summary: "SUSE Bug 1225311 for CVE-2024-35862", url: "https://bugzilla.suse.com/1225311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2024-35862", }, { cve: "CVE-2024-35863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35863", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in is_valid_oplock_break()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35863", url: "https://www.suse.com/security/cve/CVE-2024-35863", }, { category: "external", summary: "SUSE Bug 1224763 for CVE-2024-35863", url: "https://bugzilla.suse.com/1224763", }, { category: "external", summary: "SUSE Bug 1225011 for CVE-2024-35863", url: "https://bugzilla.suse.com/1225011", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2024-35863", }, { cve: "CVE-2024-35864", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35864", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in smb2_is_valid_lease_break()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35864", url: "https://www.suse.com/security/cve/CVE-2024-35864", }, { category: "external", summary: "SUSE Bug 1224765 for CVE-2024-35864", url: "https://bugzilla.suse.com/1224765", }, { category: "external", summary: "SUSE Bug 1225309 for CVE-2024-35864", url: "https://bugzilla.suse.com/1225309", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2024-35864", }, { cve: "CVE-2024-35865", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35865", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in smb2_is_valid_oplock_break()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35865", url: "https://www.suse.com/security/cve/CVE-2024-35865", }, { category: "external", summary: "SUSE Bug 1224668 for CVE-2024-35865", url: "https://bugzilla.suse.com/1224668", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35865", }, { cve: "CVE-2024-35866", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35866", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in cifs_dump_full_key()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35866", url: "https://www.suse.com/security/cve/CVE-2024-35866", }, { category: "external", summary: "SUSE Bug 1224667 for CVE-2024-35866", url: "https://bugzilla.suse.com/1224667", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35866", }, { cve: "CVE-2024-35867", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35867", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in cifs_stats_proc_show()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35867", url: "https://www.suse.com/security/cve/CVE-2024-35867", }, { category: "external", summary: "SUSE Bug 1224664 for CVE-2024-35867", url: "https://bugzilla.suse.com/1224664", }, { category: "external", summary: "SUSE Bug 1225012 for CVE-2024-35867", url: "https://bugzilla.suse.com/1225012", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2024-35867", }, { cve: "CVE-2024-35868", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35868", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in cifs_stats_proc_write()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35868", url: "https://www.suse.com/security/cve/CVE-2024-35868", }, { category: "external", summary: "SUSE Bug 1224678 for CVE-2024-35868", url: "https://bugzilla.suse.com/1224678", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35868", }, { cve: "CVE-2024-35869", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35869", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: guarantee refcounted children from parent session\n\nAvoid potential use-after-free bugs when walking DFS referrals,\nmounting and performing DFS failover by ensuring that all children\nfrom parent @tcon->ses are also refcounted. They're all needed across\nthe entire DFS mount. Get rid of @tcon->dfs_ses_list while we're at\nit, too.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35869", url: "https://www.suse.com/security/cve/CVE-2024-35869", }, { category: "external", summary: "SUSE Bug 1224679 for CVE-2024-35869", url: "https://bugzilla.suse.com/1224679", }, { category: "external", summary: "SUSE Bug 1226328 for CVE-2024-35869", url: "https://bugzilla.suse.com/1226328", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2024-35869", }, { cve: "CVE-2024-35870", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35870", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix UAF in smb2_reconnect_server()\n\nThe UAF bug is due to smb2_reconnect_server() accessing a session that\nis already being teared down by another thread that is executing\n__cifs_put_smb_ses(). This can happen when (a) the client has\nconnection to the server but no session or (b) another thread ends up\nsetting @ses->ses_status again to something different than\nSES_EXITING.\n\nTo fix this, we need to make sure to unconditionally set\n@ses->ses_status to SES_EXITING and prevent any other threads from\nsetting a new status while we're still tearing it down.\n\nThe following can be reproduced by adding some delay to right after\nthe ipc is freed in __cifs_put_smb_ses() - which will give\nsmb2_reconnect_server() worker a chance to run and then accessing\n@ses->ipc:\n\nkinit ...\nmount.cifs //srv/share /mnt/1 -o sec=krb5,nohandlecache,echo_interval=10\n[disconnect srv]\nls /mnt/1 &>/dev/null\nsleep 30\nkdestroy\n[reconnect srv]\nsleep 10\numount /mnt/1\n...\nCIFS: VFS: Verify user has a krb5 ticket and keyutils is installed\nCIFS: VFS: \\\\srv Send error in SessSetup = -126\nCIFS: VFS: Verify user has a krb5 ticket and keyutils is installed\nCIFS: VFS: \\\\srv Send error in SessSetup = -126\ngeneral protection fault, probably for non-canonical address\n0x6b6b6b6b6b6b6b6b: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 3 PID: 50 Comm: kworker/3:1 Not tainted 6.9.0-rc2 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-1.fc39\n04/01/2014\nWorkqueue: cifsiod smb2_reconnect_server [cifs]\nRIP: 0010:__list_del_entry_valid_or_report+0x33/0xf0\nCode: 4f 08 48 85 d2 74 42 48 85 c9 74 59 48 b8 00 01 00 00 00 00 ad\nde 48 39 c2 74 61 48 b8 22 01 00 00 00 00 74 69 <48> 8b 01 48 39 f8 75\n7b 48 8b 72 08 48 39 c6 0f 85 88 00 00 00 b8\nRSP: 0018:ffffc900001bfd70 EFLAGS: 00010a83\nRAX: dead000000000122 RBX: ffff88810da53838 RCX: 6b6b6b6b6b6b6b6b\nRDX: 6b6b6b6b6b6b6b6b RSI: ffffffffc02f6878 RDI: ffff88810da53800\nRBP: ffff88810da53800 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000001 R12: ffff88810c064000\nR13: 0000000000000001 R14: ffff88810c064000 R15: ffff8881039cc000\nFS: 0000000000000000(0000) GS:ffff888157c00000(0000)\nknlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fe3728b1000 CR3: 000000010caa4000 CR4: 0000000000750ef0\nPKRU: 55555554\nCall Trace:\n <TASK>\n ? die_addr+0x36/0x90\n ? exc_general_protection+0x1c1/0x3f0\n ? asm_exc_general_protection+0x26/0x30\n ? __list_del_entry_valid_or_report+0x33/0xf0\n __cifs_put_smb_ses+0x1ae/0x500 [cifs]\n smb2_reconnect_server+0x4ed/0x710 [cifs]\n process_one_work+0x205/0x6b0\n worker_thread+0x191/0x360\n ? __pfx_worker_thread+0x10/0x10\n kthread+0xe2/0x110\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x34/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n </TASK>", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35870", url: "https://www.suse.com/security/cve/CVE-2024-35870", }, { category: "external", summary: "SUSE Bug 1224672 for CVE-2024-35870", url: "https://bugzilla.suse.com/1224672", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35870", }, { cve: "CVE-2024-35872", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35872", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/secretmem: fix GUP-fast succeeding on secretmem folios\n\nfolio_is_secretmem() currently relies on secretmem folios being LRU\nfolios, to save some cycles.\n\nHowever, folios might reside in a folio batch without the LRU flag set, or\ntemporarily have their LRU flag cleared. Consequently, the LRU flag is\nunreliable for this purpose.\n\nIn particular, this is the case when secretmem_fault() allocates a fresh\npage and calls filemap_add_folio()->folio_add_lru(). The folio might be\nadded to the per-cpu folio batch and won't get the LRU flag set until the\nbatch was drained using e.g., lru_add_drain().\n\nConsequently, folio_is_secretmem() might not detect secretmem folios and\nGUP-fast can succeed in grabbing a secretmem folio, crashing the kernel\nwhen we would later try reading/writing to the folio, because the folio\nhas been unmapped from the directmap.\n\nFix it by removing that unreliable check.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35872", url: "https://www.suse.com/security/cve/CVE-2024-35872", }, { category: "external", summary: "SUSE Bug 1224530 for CVE-2024-35872", url: "https://bugzilla.suse.com/1224530", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35872", }, { cve: "CVE-2024-35875", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35875", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/coco: Require seeding RNG with RDRAND on CoCo systems\n\nThere are few uses of CoCo that don't rely on working cryptography and\nhence a working RNG. Unfortunately, the CoCo threat model means that the\nVM host cannot be trusted and may actively work against guests to\nextract secrets or manipulate computation. Since a malicious host can\nmodify or observe nearly all inputs to guests, the only remaining source\nof entropy for CoCo guests is RDRAND.\n\nIf RDRAND is broken -- due to CPU hardware fault -- the RNG as a whole\nis meant to gracefully continue on gathering entropy from other sources,\nbut since there aren't other sources on CoCo, this is catastrophic.\nThis is mostly a concern at boot time when initially seeding the RNG, as\nafter that the consequences of a broken RDRAND are much more\ntheoretical.\n\nSo, try at boot to seed the RNG using 256 bits of RDRAND output. If this\nfails, panic(). This will also trigger if the system is booted without\nRDRAND, as RDRAND is essential for a safe CoCo boot.\n\nAdd this deliberately to be \"just a CoCo x86 driver feature\" and not\npart of the RNG itself. Many device drivers and platforms have some\ndesire to contribute something to the RNG, and add_device_randomness()\nis specifically meant for this purpose.\n\nAny driver can call it with seed data of any quality, or even garbage\nquality, and it can only possibly make the quality of the RNG better or\nhave no effect, but can never make it worse.\n\nRather than trying to build something into the core of the RNG, consider\nthe particular CoCo issue just a CoCo issue, and therefore separate it\nall out into driver (well, arch/platform) code.\n\n [ bp: Massage commit message. ]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35875", url: "https://www.suse.com/security/cve/CVE-2024-35875", }, { category: "external", summary: "SUSE Bug 1224665 for CVE-2024-35875", url: "https://bugzilla.suse.com/1224665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35875", }, { cve: "CVE-2024-35877", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35877", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/mm/pat: fix VM_PAT handling in COW mappings\n\nPAT handling won't do the right thing in COW mappings: the first PTE (or,\nin fact, all PTEs) can be replaced during write faults to point at anon\nfolios. Reliably recovering the correct PFN and cachemode using\nfollow_phys() from PTEs will not work in COW mappings.\n\nUsing follow_phys(), we might just get the address+protection of the anon\nfolio (which is very wrong), or fail on swap/nonswap entries, failing\nfollow_phys() and triggering a WARN_ON_ONCE() in untrack_pfn() and\ntrack_pfn_copy(), not properly calling free_pfn_range().\n\nIn free_pfn_range(), we either wouldn't call memtype_free() or would call\nit with the wrong range, possibly leaking memory.\n\nTo fix that, let's update follow_phys() to refuse returning anon folios,\nand fallback to using the stored PFN inside vma->vm_pgoff for COW mappings\nif we run into that.\n\nWe will now properly handle untrack_pfn() with COW mappings, where we\ndon't need the cachemode. We'll have to fail fork()->track_pfn_copy() if\nthe first page was replaced by an anon folio, though: we'd have to store\nthe cachemode in the VMA to make this work, likely growing the VMA size.\n\nFor now, lets keep it simple and let track_pfn_copy() just fail in that\ncase: it would have failed in the past with swap/nonswap entries already,\nand it would have done the wrong thing with anon folios.\n\nSimple reproducer to trigger the WARN_ON_ONCE() in untrack_pfn():\n\n<--- C reproducer --->\n #include <stdio.h>\n #include <sys/mman.h>\n #include <unistd.h>\n #include <liburing.h>\n\n int main(void)\n {\n struct io_uring_params p = {};\n int ring_fd;\n size_t size;\n char *map;\n\n ring_fd = io_uring_setup(1, &p);\n if (ring_fd < 0) {\n perror(\"io_uring_setup\");\n return 1;\n }\n size = p.sq_off.array + p.sq_entries * sizeof(unsigned);\n\n /* Map the submission queue ring MAP_PRIVATE */\n map = mmap(0, size, PROT_READ | PROT_WRITE, MAP_PRIVATE,\n ring_fd, IORING_OFF_SQ_RING);\n if (map == MAP_FAILED) {\n perror(\"mmap\");\n return 1;\n }\n\n /* We have at least one page. Let's COW it. */\n *map = 0;\n pause();\n return 0;\n }\n<--- C reproducer --->\n\nOn a system with 16 GiB RAM and swap configured:\n # ./iouring &\n # memhog 16G\n # killall iouring\n[ 301.552930] ------------[ cut here ]------------\n[ 301.553285] WARNING: CPU: 7 PID: 1402 at arch/x86/mm/pat/memtype.c:1060 untrack_pfn+0xf4/0x100\n[ 301.553989] Modules linked in: binfmt_misc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_g\n[ 301.558232] CPU: 7 PID: 1402 Comm: iouring Not tainted 6.7.5-100.fc38.x86_64 #1\n[ 301.558772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebu4\n[ 301.559569] RIP: 0010:untrack_pfn+0xf4/0x100\n[ 301.559893] Code: 75 c4 eb cf 48 8b 43 10 8b a8 e8 00 00 00 3b 6b 28 74 b8 48 8b 7b 30 e8 ea 1a f7 000\n[ 301.561189] RSP: 0018:ffffba2c0377fab8 EFLAGS: 00010282\n[ 301.561590] RAX: 00000000ffffffea RBX: ffff9208c8ce9cc0 RCX: 000000010455e047\n[ 301.562105] RDX: 07fffffff0eb1e0a RSI: 0000000000000000 RDI: ffff9208c391d200\n[ 301.562628] RBP: 0000000000000000 R08: ffffba2c0377fab8 R09: 0000000000000000\n[ 301.563145] R10: ffff9208d2292d50 R11: 0000000000000002 R12: 00007fea890e0000\n[ 301.563669] R13: 0000000000000000 R14: ffffba2c0377fc08 R15: 0000000000000000\n[ 301.564186] FS: 0000000000000000(0000) GS:ffff920c2fbc0000(0000) knlGS:0000000000000000\n[ 301.564773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 301.565197] CR2: 00007fea88ee8a20 CR3: 00000001033a8000 CR4: 0000000000750ef0\n[ 301.565725] PKRU: 55555554\n[ 301.565944] Call Trace:\n[ 301.566148] <TASK>\n[ 301.566325] ? untrack_pfn+0xf4/0x100\n[ 301.566618] ? __warn+0x81/0x130\n[ 301.566876] ? untrack_pfn+0xf4/0x100\n[ 3\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35877", url: "https://www.suse.com/security/cve/CVE-2024-35877", }, { category: "external", summary: "SUSE Bug 1224525 for CVE-2024-35877", url: "https://bugzilla.suse.com/1224525", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35877", }, { cve: "CVE-2024-35878", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35878", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nof: module: prevent NULL pointer dereference in vsnprintf()\n\nIn of_modalias(), we can get passed the str and len parameters which would\ncause a kernel oops in vsnprintf() since it only allows passing a NULL ptr\nwhen the length is also 0. Also, we need to filter out the negative values\nof the len parameter as these will result in a really huge buffer since\nsnprintf() takes size_t parameter while ours is ssize_t...\n\nFound by Linux Verification Center (linuxtesting.org) with the Svace static\nanalysis tool.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35878", url: "https://www.suse.com/security/cve/CVE-2024-35878", }, { category: "external", summary: "SUSE Bug 1224671 for CVE-2024-35878", url: "https://bugzilla.suse.com/1224671", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35878", }, { cve: "CVE-2024-35879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35879", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nof: dynamic: Synchronize of_changeset_destroy() with the devlink removals\n\nIn the following sequence:\n 1) of_platform_depopulate()\n 2) of_overlay_remove()\n\nDuring the step 1, devices are destroyed and devlinks are removed.\nDuring the step 2, OF nodes are destroyed but\n__of_changeset_entry_destroy() can raise warnings related to missing\nof_node_put():\n ERROR: memory leak, expected refcount 1 instead of 2 ...\n\nIndeed, during the devlink removals performed at step 1, the removal\nitself releasing the device (and the attached of_node) is done by a job\nqueued in a workqueue and so, it is done asynchronously with respect to\nfunction calls.\nWhen the warning is present, of_node_put() will be called but wrongly\ntoo late from the workqueue job.\n\nIn order to be sure that any ongoing devlink removals are done before\nthe of_node destruction, synchronize the of_changeset_destroy() with the\ndevlink removals.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35879", url: "https://www.suse.com/security/cve/CVE-2024-35879", }, { category: "external", summary: "SUSE Bug 1224524 for CVE-2024-35879", url: "https://bugzilla.suse.com/1224524", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35879", }, { cve: "CVE-2024-35885", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35885", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxbf_gige: stop interface during shutdown\n\nThe mlxbf_gige driver intermittantly encounters a NULL pointer\nexception while the system is shutting down via \"reboot\" command.\nThe mlxbf_driver will experience an exception right after executing\nits shutdown() method. One example of this exception is:\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000070\nMem abort info:\n ESR = 0x0000000096000004\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x04: level 0 translation fault\nData abort info:\n ISV = 0, ISS = 0x00000004\n CM = 0, WnR = 0\nuser pgtable: 4k pages, 48-bit VAs, pgdp=000000011d373000\n[0000000000000070] pgd=0000000000000000, p4d=0000000000000000\nInternal error: Oops: 96000004 [#1] SMP\nCPU: 0 PID: 13 Comm: ksoftirqd/0 Tainted: G S OE 5.15.0-bf.6.gef6992a #1\nHardware name: https://www.mellanox.com BlueField SoC/BlueField SoC, BIOS 4.0.2.12669 Apr 21 2023\npstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : mlxbf_gige_handle_tx_complete+0xc8/0x170 [mlxbf_gige]\nlr : mlxbf_gige_poll+0x54/0x160 [mlxbf_gige]\nsp : ffff8000080d3c10\nx29: ffff8000080d3c10 x28: ffffcce72cbb7000 x27: ffff8000080d3d58\nx26: ffff0000814e7340 x25: ffff331cd1a05000 x24: ffffcce72c4ea008\nx23: ffff0000814e4b40 x22: ffff0000814e4d10 x21: ffff0000814e4128\nx20: 0000000000000000 x19: ffff0000814e4a80 x18: ffffffffffffffff\nx17: 000000000000001c x16: ffffcce72b4553f4 x15: ffff80008805b8a7\nx14: 0000000000000000 x13: 0000000000000030 x12: 0101010101010101\nx11: 7f7f7f7f7f7f7f7f x10: c2ac898b17576267 x9 : ffffcce720fa5404\nx8 : ffff000080812138 x7 : 0000000000002e9a x6 : 0000000000000080\nx5 : ffff00008de3b000 x4 : 0000000000000000 x3 : 0000000000000001\nx2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000\nCall trace:\n mlxbf_gige_handle_tx_complete+0xc8/0x170 [mlxbf_gige]\n mlxbf_gige_poll+0x54/0x160 [mlxbf_gige]\n __napi_poll+0x40/0x1c8\n net_rx_action+0x314/0x3a0\n __do_softirq+0x128/0x334\n run_ksoftirqd+0x54/0x6c\n smpboot_thread_fn+0x14c/0x190\n kthread+0x10c/0x110\n ret_from_fork+0x10/0x20\nCode: 8b070000 f9000ea0 f95056c0 f86178a1 (b9407002)\n---[ end trace 7cc3941aa0d8e6a4 ]---\nKernel panic - not syncing: Oops: Fatal exception in interrupt\nKernel Offset: 0x4ce722520000 from 0xffff800008000000\nPHYS_OFFSET: 0x80000000\nCPU features: 0x000005c1,a3330e5a\nMemory Limit: none\n---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]---\n\nDuring system shutdown, the mlxbf_gige driver's shutdown() is always executed.\nHowever, the driver's stop() method will only execute if networking interface\nconfiguration logic within the Linux distribution has been setup to do so.\n\nIf shutdown() executes but stop() does not execute, NAPI remains enabled\nand this can lead to an exception if NAPI is scheduled while the hardware\ninterface has only been partially deinitialized.\n\nThe networking interface managed by the mlxbf_gige driver must be properly\nstopped during system shutdown so that IFF_UP is cleared, the hardware\ninterface is put into a clean state, and NAPI is fully deinitialized.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35885", url: "https://www.suse.com/security/cve/CVE-2024-35885", }, { category: "external", summary: "SUSE Bug 1224519 for CVE-2024-35885", url: "https://bugzilla.suse.com/1224519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35885", }, { cve: "CVE-2024-35887", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35887", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nax25: fix use-after-free bugs caused by ax25_ds_del_timer\n\nWhen the ax25 device is detaching, the ax25_dev_device_down()\ncalls ax25_ds_del_timer() to cleanup the slave_timer. When\nthe timer handler is running, the ax25_ds_del_timer() that\ncalls del_timer() in it will return directly. As a result,\nthe use-after-free bugs could happen, one of the scenarios\nis shown below:\n\n (Thread 1) | (Thread 2)\n | ax25_ds_timeout()\nax25_dev_device_down() |\n ax25_ds_del_timer() |\n del_timer() |\n ax25_dev_put() //FREE |\n | ax25_dev-> //USE\n\nIn order to mitigate bugs, when the device is detaching, use\ntimer_shutdown_sync() to stop the timer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35887", url: "https://www.suse.com/security/cve/CVE-2024-35887", }, { category: "external", summary: "SUSE Bug 1224663 for CVE-2024-35887", url: "https://bugzilla.suse.com/1224663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35887", }, { cve: "CVE-2024-35895", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35895", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Prevent lock inversion deadlock in map delete elem\n\nsyzkaller started using corpuses where a BPF tracing program deletes\nelements from a sockmap/sockhash map. Because BPF tracing programs can be\ninvoked from any interrupt context, locks taken during a map_delete_elem\noperation must be hardirq-safe. Otherwise a deadlock due to lock inversion\nis possible, as reported by lockdep:\n\n CPU0 CPU1\n ---- ----\n lock(&htab->buckets[i].lock);\n local_irq_disable();\n lock(&host->lock);\n lock(&htab->buckets[i].lock);\n <Interrupt>\n lock(&host->lock);\n\nLocks in sockmap are hardirq-unsafe by design. We expects elements to be\ndeleted from sockmap/sockhash only in task (normal) context with interrupts\nenabled, or in softirq context.\n\nDetect when map_delete_elem operation is invoked from a context which is\n_not_ hardirq-unsafe, that is interrupts are disabled, and bail out with an\nerror.\n\nNote that map updates are not affected by this issue. BPF verifier does not\nallow updating sockmap/sockhash from a BPF tracing program today.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35895", url: "https://www.suse.com/security/cve/CVE-2024-35895", }, { category: "external", summary: "SUSE Bug 1224511 for CVE-2024-35895", url: "https://bugzilla.suse.com/1224511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35895", }, { cve: "CVE-2024-35901", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35901", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mana: Fix Rx DMA datasize and skb_over_panic\n\nmana_get_rxbuf_cfg() aligns the RX buffer's DMA datasize to be\nmultiple of 64. So a packet slightly bigger than mtu+14, say 1536,\ncan be received and cause skb_over_panic.\n\nSample dmesg:\n[ 5325.237162] skbuff: skb_over_panic: text:ffffffffc043277a len:1536 put:1536 head:ff1100018b517000 data:ff1100018b517100 tail:0x700 end:0x6ea dev:<NULL>\n[ 5325.243689] ------------[ cut here ]------------\n[ 5325.245748] kernel BUG at net/core/skbuff.c:192!\n[ 5325.247838] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n[ 5325.258374] RIP: 0010:skb_panic+0x4f/0x60\n[ 5325.302941] Call Trace:\n[ 5325.304389] <IRQ>\n[ 5325.315794] ? skb_panic+0x4f/0x60\n[ 5325.317457] ? asm_exc_invalid_op+0x1f/0x30\n[ 5325.319490] ? skb_panic+0x4f/0x60\n[ 5325.321161] skb_put+0x4e/0x50\n[ 5325.322670] mana_poll+0x6fa/0xb50 [mana]\n[ 5325.324578] __napi_poll+0x33/0x1e0\n[ 5325.326328] net_rx_action+0x12e/0x280\n\nAs discussed internally, this alignment is not necessary. To fix\nthis bug, remove it from the code. So oversized packets will be\nmarked as CQE_RX_TRUNCATED by NIC, and dropped.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35901", url: "https://www.suse.com/security/cve/CVE-2024-35901", }, { category: "external", summary: "SUSE Bug 1224495 for CVE-2024-35901", url: "https://bugzilla.suse.com/1224495", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35901", }, { cve: "CVE-2024-35904", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35904", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nselinux: avoid dereference of garbage after mount failure\n\nIn case kern_mount() fails and returns an error pointer return in the\nerror branch instead of continuing and dereferencing the error pointer.\n\nWhile on it drop the never read static variable selinuxfs_mount.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35904", url: "https://www.suse.com/security/cve/CVE-2024-35904", }, { category: "external", summary: "SUSE Bug 1224494 for CVE-2024-35904", url: "https://bugzilla.suse.com/1224494", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35904", }, { cve: "CVE-2024-35905", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35905", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Protect against int overflow for stack access size\n\nThis patch re-introduces protection against the size of access to stack\nmemory being negative; the access size can appear negative as a result\nof overflowing its signed int representation. This should not actually\nhappen, as there are other protections along the way, but we should\nprotect against it anyway. One code path was missing such protections\n(fixed in the previous patch in the series), causing out-of-bounds array\naccesses in check_stack_range_initialized(). This patch causes the\nverification of a program with such a non-sensical access size to fail.\n\nThis check used to exist in a more indirect way, but was inadvertendly\nremoved in a833a17aeac7.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35905", url: "https://www.suse.com/security/cve/CVE-2024-35905", }, { category: "external", summary: "SUSE Bug 1224488 for CVE-2024-35905", url: "https://bugzilla.suse.com/1224488", }, { category: "external", summary: "SUSE Bug 1226327 for CVE-2024-35905", url: "https://bugzilla.suse.com/1226327", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2024-35905", }, { cve: "CVE-2024-35907", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35907", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxbf_gige: call request_irq() after NAPI initialized\n\nThe mlxbf_gige driver encounters a NULL pointer exception in\nmlxbf_gige_open() when kdump is enabled. The sequence to reproduce\nthe exception is as follows:\na) enable kdump\nb) trigger kdump via \"echo c > /proc/sysrq-trigger\"\nc) kdump kernel executes\nd) kdump kernel loads mlxbf_gige module\ne) the mlxbf_gige module runs its open() as the\n the \"oob_net0\" interface is brought up\nf) mlxbf_gige module will experience an exception\n during its open(), something like:\n\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n Mem abort info:\n ESR = 0x0000000086000004\n EC = 0x21: IABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x04: level 0 translation fault\n user pgtable: 4k pages, 48-bit VAs, pgdp=00000000e29a4000\n [0000000000000000] pgd=0000000000000000, p4d=0000000000000000\n Internal error: Oops: 0000000086000004 [#1] SMP\n CPU: 0 PID: 812 Comm: NetworkManager Tainted: G OE 5.15.0-1035-bluefield #37-Ubuntu\n Hardware name: https://www.mellanox.com BlueField-3 SmartNIC Main Card/BlueField-3 SmartNIC Main Card, BIOS 4.6.0.13024 Jan 19 2024\n pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : 0x0\n lr : __napi_poll+0x40/0x230\n sp : ffff800008003e00\n x29: ffff800008003e00 x28: 0000000000000000 x27: 00000000ffffffff\n x26: ffff000066027238 x25: ffff00007cedec00 x24: ffff800008003ec8\n x23: 000000000000012c x22: ffff800008003eb7 x21: 0000000000000000\n x20: 0000000000000001 x19: ffff000066027238 x18: 0000000000000000\n x17: ffff578fcb450000 x16: ffffa870b083c7c0 x15: 0000aaab010441d0\n x14: 0000000000000001 x13: 00726f7272655f65 x12: 6769675f6662786c\n x11: 0000000000000000 x10: 0000000000000000 x9 : ffffa870b0842398\n x8 : 0000000000000004 x7 : fe5a48b9069706ea x6 : 17fdb11fc84ae0d2\n x5 : d94a82549d594f35 x4 : 0000000000000000 x3 : 0000000000400100\n x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000066027238\n Call trace:\n 0x0\n net_rx_action+0x178/0x360\n __do_softirq+0x15c/0x428\n __irq_exit_rcu+0xac/0xec\n irq_exit+0x18/0x2c\n handle_domain_irq+0x6c/0xa0\n gic_handle_irq+0xec/0x1b0\n call_on_irq_stack+0x20/0x2c\n do_interrupt_handler+0x5c/0x70\n el1_interrupt+0x30/0x50\n el1h_64_irq_handler+0x18/0x2c\n el1h_64_irq+0x7c/0x80\n __setup_irq+0x4c0/0x950\n request_threaded_irq+0xf4/0x1bc\n mlxbf_gige_request_irqs+0x68/0x110 [mlxbf_gige]\n mlxbf_gige_open+0x5c/0x170 [mlxbf_gige]\n __dev_open+0x100/0x220\n __dev_change_flags+0x16c/0x1f0\n dev_change_flags+0x2c/0x70\n do_setlink+0x220/0xa40\n __rtnl_newlink+0x56c/0x8a0\n rtnl_newlink+0x58/0x84\n rtnetlink_rcv_msg+0x138/0x3c4\n netlink_rcv_skb+0x64/0x130\n rtnetlink_rcv+0x20/0x30\n netlink_unicast+0x2ec/0x360\n netlink_sendmsg+0x278/0x490\n __sock_sendmsg+0x5c/0x6c\n ____sys_sendmsg+0x290/0x2d4\n ___sys_sendmsg+0x84/0xd0\n __sys_sendmsg+0x70/0xd0\n __arm64_sys_sendmsg+0x2c/0x40\n invoke_syscall+0x78/0x100\n el0_svc_common.constprop.0+0x54/0x184\n do_el0_svc+0x30/0xac\n el0_svc+0x48/0x160\n el0t_64_sync_handler+0xa4/0x12c\n el0t_64_sync+0x1a4/0x1a8\n Code: bad PC value\n ---[ end trace 7d1c3f3bf9d81885 ]---\n Kernel panic - not syncing: Oops: Fatal exception in interrupt\n Kernel Offset: 0x2870a7a00000 from 0xffff800008000000\n PHYS_OFFSET: 0x80000000\n CPU features: 0x0,000005c1,a3332a5a\n Memory Limit: none\n ---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]---\n\nThe exception happens because there is a pending RX interrupt before the\ncall to request_irq(RX IRQ) executes. Then, the RX IRQ handler fires\nimmediately after this request_irq() completes. The\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35907", url: "https://www.suse.com/security/cve/CVE-2024-35907", }, { category: "external", summary: "SUSE Bug 1224492 for CVE-2024-35907", url: "https://bugzilla.suse.com/1224492", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35907", }, { cve: "CVE-2024-35912", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35912", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: rfi: fix potential response leaks\n\nIf the rx payload length check fails, or if kmemdup() fails,\nwe still need to free the command response. Fix that.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35912", url: "https://www.suse.com/security/cve/CVE-2024-35912", }, { category: "external", summary: "SUSE Bug 1224487 for CVE-2024-35912", url: "https://bugzilla.suse.com/1224487", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35912", }, { cve: "CVE-2024-35914", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35914", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: Fix error cleanup path in nfsd_rename()\n\nCommit a8b0026847b8 (\"rename(): avoid a deadlock in the case of parents\nhaving no common ancestor\") added an error bail out path. However this\npath does not drop the remount protection that has been acquired. Fix\nthe cleanup path to properly drop the remount protection.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35914", url: "https://www.suse.com/security/cve/CVE-2024-35914", }, { category: "external", summary: "SUSE Bug 1224482 for CVE-2024-35914", url: "https://bugzilla.suse.com/1224482", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35914", }, { cve: "CVE-2024-35915", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35915", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet\n\nsyzbot reported the following uninit-value access issue [1][2]:\n\nnci_rx_work() parses and processes received packet. When the payload\nlength is zero, each message type handler reads uninitialized payload\nand KMSAN detects this issue. The receipt of a packet with a zero-size\npayload is considered unexpected, and therefore, such packets should be\nsilently discarded.\n\nThis patch resolved this issue by checking payload size before calling\neach message type handler codes.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35915", url: "https://www.suse.com/security/cve/CVE-2024-35915", }, { category: "external", summary: "SUSE Bug 1224479 for CVE-2024-35915", url: "https://bugzilla.suse.com/1224479", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35915", }, { cve: "CVE-2024-35922", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35922", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nfbmon: prevent division by zero in fb_videomode_from_videomode()\n\nThe expression htotal * vtotal can have a zero value on\noverflow. It is necessary to prevent division by zero like in\nfb_var_to_videomode().\n\nFound by Linux Verification Center (linuxtesting.org) with Svace.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35922", url: "https://www.suse.com/security/cve/CVE-2024-35922", }, { category: "external", summary: "SUSE Bug 1224660 for CVE-2024-35922", url: "https://bugzilla.suse.com/1224660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35922", }, { cve: "CVE-2024-35924", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35924", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: Limit read size on v1.2\n\nBetween UCSI 1.2 and UCSI 2.0, the size of the MESSAGE_IN region was\nincreased from 16 to 256. In order to avoid overflowing reads for older\nsystems, add a mechanism to use the read UCSI version to truncate read\nsizes on UCSI v1.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35924", url: "https://www.suse.com/security/cve/CVE-2024-35924", }, { category: "external", summary: "SUSE Bug 1224657 for CVE-2024-35924", url: "https://bugzilla.suse.com/1224657", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35924", }, { cve: "CVE-2024-35930", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35930", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()\n\nThe call to lpfc_sli4_resume_rpi() in lpfc_rcv_padisc() may return an\nunsuccessful status. In such cases, the elsiocb is not issued, the\ncompletion is not called, and thus the elsiocb resource is leaked.\n\nCheck return value after calling lpfc_sli4_resume_rpi() and conditionally\nrelease the elsiocb resource.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35930", url: "https://www.suse.com/security/cve/CVE-2024-35930", }, { category: "external", summary: "SUSE Bug 1224651 for CVE-2024-35930", url: "https://bugzilla.suse.com/1224651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35930", }, { cve: "CVE-2024-35932", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35932", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vc4: don't check if plane->state->fb == state->fb\n\nCurrently, when using non-blocking commits, we can see the following\nkernel warning:\n\n[ 110.908514] ------------[ cut here ]------------\n[ 110.908529] refcount_t: underflow; use-after-free.\n[ 110.908620] WARNING: CPU: 0 PID: 1866 at lib/refcount.c:87 refcount_dec_not_one+0xb8/0xc0\n[ 110.908664] Modules linked in: rfcomm snd_seq_dummy snd_hrtimer snd_seq snd_seq_device cmac algif_hash aes_arm64 aes_generic algif_skcipher af_alg bnep hid_logitech_hidpp vc4 brcmfmac hci_uart btbcm brcmutil bluetooth snd_soc_hdmi_codec cfg80211 cec drm_display_helper drm_dma_helper drm_kms_helper snd_soc_core snd_compress snd_pcm_dmaengine fb_sys_fops sysimgblt syscopyarea sysfillrect raspberrypi_hwmon ecdh_generic ecc rfkill libaes i2c_bcm2835 binfmt_misc joydev snd_bcm2835(C) bcm2835_codec(C) bcm2835_isp(C) v4l2_mem2mem videobuf2_dma_contig snd_pcm bcm2835_v4l2(C) raspberrypi_gpiomem bcm2835_mmal_vchiq(C) videobuf2_v4l2 snd_timer videobuf2_vmalloc videobuf2_memops videobuf2_common snd videodev vc_sm_cma(C) mc hid_logitech_dj uio_pdrv_genirq uio i2c_dev drm fuse dm_mod drm_panel_orientation_quirks backlight ip_tables x_tables ipv6\n[ 110.909086] CPU: 0 PID: 1866 Comm: kodi.bin Tainted: G C 6.1.66-v8+ #32\n[ 110.909104] Hardware name: Raspberry Pi 3 Model B Rev 1.2 (DT)\n[ 110.909114] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 110.909132] pc : refcount_dec_not_one+0xb8/0xc0\n[ 110.909152] lr : refcount_dec_not_one+0xb4/0xc0\n[ 110.909170] sp : ffffffc00913b9c0\n[ 110.909177] x29: ffffffc00913b9c0 x28: 000000556969bbb0 x27: 000000556990df60\n[ 110.909205] x26: 0000000000000002 x25: 0000000000000004 x24: ffffff8004448480\n[ 110.909230] x23: ffffff800570b500 x22: ffffff802e03a7bc x21: ffffffecfca68c78\n[ 110.909257] x20: ffffff8002b42000 x19: ffffff802e03a600 x18: 0000000000000000\n[ 110.909283] x17: 0000000000000011 x16: ffffffffffffffff x15: 0000000000000004\n[ 110.909308] x14: 0000000000000fff x13: ffffffed577e47e0 x12: 0000000000000003\n[ 110.909333] x11: 0000000000000000 x10: 0000000000000027 x9 : c912d0d083728c00\n[ 110.909359] x8 : c912d0d083728c00 x7 : 65646e75203a745f x6 : 746e756f63666572\n[ 110.909384] x5 : ffffffed579f62ee x4 : ffffffed579eb01e x3 : 0000000000000000\n[ 110.909409] x2 : 0000000000000000 x1 : ffffffc00913b750 x0 : 0000000000000001\n[ 110.909434] Call trace:\n[ 110.909441] refcount_dec_not_one+0xb8/0xc0\n[ 110.909461] vc4_bo_dec_usecnt+0x4c/0x1b0 [vc4]\n[ 110.909903] vc4_cleanup_fb+0x44/0x50 [vc4]\n[ 110.910315] drm_atomic_helper_cleanup_planes+0x88/0xa4 [drm_kms_helper]\n[ 110.910669] vc4_atomic_commit_tail+0x390/0x9dc [vc4]\n[ 110.911079] commit_tail+0xb0/0x164 [drm_kms_helper]\n[ 110.911397] drm_atomic_helper_commit+0x1d0/0x1f0 [drm_kms_helper]\n[ 110.911716] drm_atomic_commit+0xb0/0xdc [drm]\n[ 110.912569] drm_mode_atomic_ioctl+0x348/0x4b8 [drm]\n[ 110.913330] drm_ioctl_kernel+0xec/0x15c [drm]\n[ 110.914091] drm_ioctl+0x24c/0x3b0 [drm]\n[ 110.914850] __arm64_sys_ioctl+0x9c/0xd4\n[ 110.914873] invoke_syscall+0x4c/0x114\n[ 110.914897] el0_svc_common+0xd0/0x118\n[ 110.914917] do_el0_svc+0x38/0xd0\n[ 110.914936] el0_svc+0x30/0x8c\n[ 110.914958] el0t_64_sync_handler+0x84/0xf0\n[ 110.914979] el0t_64_sync+0x18c/0x190\n[ 110.914996] ---[ end trace 0000000000000000 ]---\n\nThis happens because, although `prepare_fb` and `cleanup_fb` are\nperfectly balanced, we cannot guarantee consistency in the check\nplane->state->fb == state->fb. This means that sometimes we can increase\nthe refcount in `prepare_fb` and don't decrease it in `cleanup_fb`. The\nopposite can also be true.\n\nIn fact, the struct drm_plane .state shouldn't be accessed directly\nbut instead, the `drm_atomic_get_new_plane_state()` helper function should\nbe used. So, we could stick to this check, but using\n`drm_atomic_get_new_plane_state()`. But actually, this check is not re\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35932", url: "https://www.suse.com/security/cve/CVE-2024-35932", }, { category: "external", summary: "SUSE Bug 1224650 for CVE-2024-35932", url: "https://bugzilla.suse.com/1224650", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35932", }, { cve: "CVE-2024-35933", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35933", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btintel: Fix null ptr deref in btintel_read_version\n\nIf hci_cmd_sync_complete() is triggered and skb is NULL, then\nhdev->req_skb is NULL, which will cause this issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35933", url: "https://www.suse.com/security/cve/CVE-2024-35933", }, { category: "external", summary: "SUSE Bug 1224640 for CVE-2024-35933", url: "https://bugzilla.suse.com/1224640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35933", }, { cve: "CVE-2024-35935", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35935", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: send: handle path ref underflow in header iterate_inode_ref()\n\nChange BUG_ON to proper error handling if building the path buffer\nfails. The pointers are not printed so we don't accidentally leak kernel\naddresses.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35935", url: "https://www.suse.com/security/cve/CVE-2024-35935", }, { category: "external", summary: "SUSE Bug 1224645 for CVE-2024-35935", url: "https://bugzilla.suse.com/1224645", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35935", }, { cve: "CVE-2024-35936", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35936", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks()\n\nThe unhandled case in btrfs_relocate_sys_chunks() loop is a corruption,\nas it could be caused only by two impossible conditions:\n\n- at first the search key is set up to look for a chunk tree item, with\n offset -1, this is an inexact search and the key->offset will contain\n the correct offset upon a successful search, a valid chunk tree item\n cannot have an offset -1\n\n- after first successful search, the found_key corresponds to a chunk\n item, the offset is decremented by 1 before the next loop, it's\n impossible to find a chunk item there due to alignment and size\n constraints", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35936", url: "https://www.suse.com/security/cve/CVE-2024-35936", }, { category: "external", summary: "SUSE Bug 1224644 for CVE-2024-35936", url: "https://bugzilla.suse.com/1224644", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35936", }, { cve: "CVE-2024-35938", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35938", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: decrease MHI channel buffer length to 8KB\n\nCurrently buf_len field of ath11k_mhi_config_qca6390 is assigned\nwith 0, making MHI use a default size, 64KB, to allocate channel\nbuffers. This is likely to fail in some scenarios where system\nmemory is highly fragmented and memory compaction or reclaim is\nnot allowed.\n\nThere is a fail report which is caused by it:\nkworker/u32:45: page allocation failure: order:4, mode:0x40c00(GFP_NOIO|__GFP_COMP), nodemask=(null),cpuset=/,mems_allowed=0\nCPU: 0 PID: 19318 Comm: kworker/u32:45 Not tainted 6.8.0-rc3-1.gae4495f-default #1 openSUSE Tumbleweed (unreleased) 493b6d5b382c603654d7a81fc3c144d59a1dfceb\nWorkqueue: events_unbound async_run_entry_fn\nCall Trace:\n <TASK>\n dump_stack_lvl+0x47/0x60\n warn_alloc+0x13a/0x1b0\n ? srso_alias_return_thunk+0x5/0xfbef5\n ? __alloc_pages_direct_compact+0xab/0x210\n __alloc_pages_slowpath.constprop.0+0xd3e/0xda0\n __alloc_pages+0x32d/0x350\n ? mhi_prepare_channel+0x127/0x2d0 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]\n __kmalloc_large_node+0x72/0x110\n __kmalloc+0x37c/0x480\n ? mhi_map_single_no_bb+0x77/0xf0 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]\n ? mhi_prepare_channel+0x127/0x2d0 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]\n mhi_prepare_channel+0x127/0x2d0 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]\n __mhi_prepare_for_transfer+0x44/0x80 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]\n ? __pfx_____mhi_prepare_for_transfer+0x10/0x10 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]\n device_for_each_child+0x5c/0xa0\n ? __pfx_pci_pm_resume+0x10/0x10\n ath11k_core_resume+0x65/0x100 [ath11k a5094e22d7223135c40d93c8f5321cf09fd85e4e]\n ? srso_alias_return_thunk+0x5/0xfbef5\n ath11k_pci_pm_resume+0x32/0x60 [ath11k_pci 830b7bfc3ea80ebef32e563cafe2cb55e9cc73ec]\n ? srso_alias_return_thunk+0x5/0xfbef5\n dpm_run_callback+0x8c/0x1e0\n device_resume+0x104/0x340\n ? __pfx_dpm_watchdog_handler+0x10/0x10\n async_resume+0x1d/0x30\n async_run_entry_fn+0x32/0x120\n process_one_work+0x168/0x330\n worker_thread+0x2f5/0x410\n ? __pfx_worker_thread+0x10/0x10\n kthread+0xe8/0x120\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x34/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1b/0x30\n </TASK>\n\nActually those buffers are used only by QMI target -> host communication.\nAnd for WCN6855 and QCA6390, the largest packet size for that is less\nthan 6KB. So change buf_len field to 8KB, which results in order 1\nallocation if page size is 4KB. In this way, we can at least save some\nmemory, and as well as decrease the possibility of allocation failure\nin those scenarios.\n\nTested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35938", url: "https://www.suse.com/security/cve/CVE-2024-35938", }, { category: "external", summary: "SUSE Bug 1224643 for CVE-2024-35938", url: "https://bugzilla.suse.com/1224643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-35938", }, { cve: "CVE-2024-35939", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35939", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndma-direct: Leak pages on dma_set_decrypted() failure\n\nOn TDX it is possible for the untrusted host to cause\nset_memory_encrypted() or set_memory_decrypted() to fail such that an\nerror is returned and the resulting memory is shared. Callers need to\ntake care to handle these errors to avoid returning decrypted (shared)\nmemory to the page allocator, which could lead to functional or security\nissues.\n\nDMA could free decrypted/shared pages if dma_set_decrypted() fails. This\nshould be a rare case. Just leak the pages in this case instead of\nfreeing them.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35939", url: "https://www.suse.com/security/cve/CVE-2024-35939", }, { category: "external", summary: "SUSE Bug 1224535 for CVE-2024-35939", url: "https://bugzilla.suse.com/1224535", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35939", }, { cve: "CVE-2024-35940", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35940", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\npstore/zone: Add a null pointer check to the psz_kmsg_read\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure. Ensure the allocation was successful\nby checking the pointer validity.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35940", url: "https://www.suse.com/security/cve/CVE-2024-35940", }, { category: "external", summary: "SUSE Bug 1224537 for CVE-2024-35940", url: "https://bugzilla.suse.com/1224537", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-35940", }, { cve: "CVE-2024-35943", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35943", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\npmdomain: ti: Add a null pointer check to the omap_prm_domain_init\n\ndevm_kasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure. Ensure the allocation was successful\nby checking the pointer validity.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35943", url: "https://www.suse.com/security/cve/CVE-2024-35943", }, { category: "external", summary: "SUSE Bug 1224649 for CVE-2024-35943", url: "https://bugzilla.suse.com/1224649", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35943", }, { cve: "CVE-2024-35944", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35944", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nVMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()\n\nSyzkaller hit 'WARNING in dg_dispatch_as_host' bug.\n\nmemcpy: detected field-spanning write (size 56) of single field \"&dg_info->msg\"\nat drivers/misc/vmw_vmci/vmci_datagram.c:237 (size 24)\n\nWARNING: CPU: 0 PID: 1555 at drivers/misc/vmw_vmci/vmci_datagram.c:237\ndg_dispatch_as_host+0x88e/0xa60 drivers/misc/vmw_vmci/vmci_datagram.c:237\n\nSome code commentry, based on my understanding:\n\n544 #define VMCI_DG_SIZE(_dg) (VMCI_DG_HEADERSIZE + (size_t)(_dg)->payload_size)\n/// This is 24 + payload_size\n\nmemcpy(&dg_info->msg, dg, dg_size);\n\tDestination = dg_info->msg ---> this is a 24 byte\n\t\t\t\t\tstructure(struct vmci_datagram)\n\tSource = dg --> this is a 24 byte structure (struct vmci_datagram)\n\tSize = dg_size = 24 + payload_size\n\n{payload_size = 56-24 =32} -- Syzkaller managed to set payload_size to 32.\n\n 35 struct delayed_datagram_info {\n 36 struct datagram_entry *entry;\n 37 struct work_struct work;\n 38 bool in_dg_host_queue;\n 39 /* msg and msg_payload must be together. */\n 40 struct vmci_datagram msg;\n 41 u8 msg_payload[];\n 42 };\n\nSo those extra bytes of payload are copied into msg_payload[], a run time\nwarning is seen while fuzzing with Syzkaller.\n\nOne possible way to fix the warning is to split the memcpy() into\ntwo parts -- one -- direct assignment of msg and second taking care of payload.\n\nGustavo quoted:\n\"Under FORTIFY_SOURCE we should not copy data across multiple members\nin a structure.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35944", url: "https://www.suse.com/security/cve/CVE-2024-35944", }, { category: "external", summary: "SUSE Bug 1224648 for CVE-2024-35944", url: "https://bugzilla.suse.com/1224648", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35944", }, { cve: "CVE-2024-35947", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35947", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndyndbg: fix old BUG_ON in >control parser\n\nFix a BUG_ON from 2009. Even if it looks \"unreachable\" (I didn't\nreally look), lets make sure by removing it, doing pr_err and return\n-EINVAL instead.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35947", url: "https://www.suse.com/security/cve/CVE-2024-35947", }, { category: "external", summary: "SUSE Bug 1224647 for CVE-2024-35947", url: "https://bugzilla.suse.com/1224647", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35947", }, { cve: "CVE-2024-35950", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35950", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/client: Fully protect modes[] with dev->mode_config.mutex\n\nThe modes[] array contains pointers to modes on the connectors'\nmode lists, which are protected by dev->mode_config.mutex.\nThus we need to extend modes[] the same protection or by the\ntime we use it the elements may already be pointing to\nfreed/reused memory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35950", url: "https://www.suse.com/security/cve/CVE-2024-35950", }, { category: "external", summary: "SUSE Bug 1224703 for CVE-2024-35950", url: "https://bugzilla.suse.com/1224703", }, { category: "external", summary: "SUSE Bug 1225310 for CVE-2024-35950", url: "https://bugzilla.suse.com/1225310", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35950", }, { cve: "CVE-2024-35951", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35951", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr()\n\nSubject: [PATCH] drm/panfrost: Fix the error path in\n panfrost_mmu_map_fault_addr()\n\nIf some the pages or sgt allocation failed, we shouldn't release the\npages ref we got earlier, otherwise we will end up with unbalanced\nget/put_pages() calls. We should instead leave everything in place\nand let the BO release function deal with extra cleanup when the object\nis destroyed, or let the fault handler try again next time it's called.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35951", url: "https://www.suse.com/security/cve/CVE-2024-35951", }, { category: "external", summary: "SUSE Bug 1224701 for CVE-2024-35951", url: "https://bugzilla.suse.com/1224701", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35951", }, { cve: "CVE-2024-35952", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35952", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/ast: Fix soft lockup\n\nThere is a while-loop in ast_dp_set_on_off() that could lead to\ninfinite-loop. This is because the register, VGACRI-Dx, checked in\nthis API is a scratch register actually controlled by a MCU, named\nDPMCU, in BMC.\n\nThese scratch registers are protected by scu-lock. If suc-lock is not\noff, DPMCU can not update these registers and then host will have soft\nlockup due to never updated status.\n\nDPMCU is used to control DP and relative registers to handshake with\nhost's VGA driver. Even the most time-consuming task, DP's link\ntraining, is less than 100ms. 200ms should be enough.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35952", url: "https://www.suse.com/security/cve/CVE-2024-35952", }, { category: "external", summary: "SUSE Bug 1224705 for CVE-2024-35952", url: "https://bugzilla.suse.com/1224705", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35952", }, { cve: "CVE-2024-35955", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35955", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nkprobes: Fix possible use-after-free issue on kprobe registration\n\nWhen unloading a module, its state is changing MODULE_STATE_LIVE ->\n MODULE_STATE_GOING -> MODULE_STATE_UNFORMED. Each change will take\na time. `is_module_text_address()` and `__module_text_address()`\nworks with MODULE_STATE_LIVE and MODULE_STATE_GOING.\nIf we use `is_module_text_address()` and `__module_text_address()`\nseparately, there is a chance that the first one is succeeded but the\nnext one is failed because module->state becomes MODULE_STATE_UNFORMED\nbetween those operations.\n\nIn `check_kprobe_address_safe()`, if the second `__module_text_address()`\nis failed, that is ignored because it expected a kernel_text address.\nBut it may have failed simply because module->state has been changed\nto MODULE_STATE_UNFORMED. In this case, arm_kprobe() will try to modify\nnon-exist module text address (use-after-free).\n\nTo fix this problem, we should not use separated `is_module_text_address()`\nand `__module_text_address()`, but use only `__module_text_address()`\nonce and do `try_module_get(module)` which is only available with\nMODULE_STATE_LIVE.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35955", url: "https://www.suse.com/security/cve/CVE-2024-35955", }, { category: "external", summary: "SUSE Bug 1224676 for CVE-2024-35955", url: "https://bugzilla.suse.com/1224676", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35955", }, { cve: "CVE-2024-35959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35959", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix mlx5e_priv_init() cleanup flow\n\nWhen mlx5e_priv_init() fails, the cleanup flow calls mlx5e_selq_cleanup which\ncalls mlx5e_selq_apply() that assures that the `priv->state_lock` is held using\nlockdep_is_held().\n\nAcquire the state_lock in mlx5e_selq_cleanup().\n\nKernel log:\n=============================\nWARNING: suspicious RCU usage\n6.8.0-rc3_net_next_841a9b5 #1 Not tainted\n-----------------------------\ndrivers/net/ethernet/mellanox/mlx5/core/en/selq.c:124 suspicious rcu_dereference_protected() usage!\n\nother info that might help us debug this:\n\nrcu_scheduler_active = 2, debug_locks = 1\n2 locks held by systemd-modules/293:\n #0: ffffffffa05067b0 (devices_rwsem){++++}-{3:3}, at: ib_register_client+0x109/0x1b0 [ib_core]\n #1: ffff8881096c65c0 (&device->client_data_rwsem){++++}-{3:3}, at: add_client_context+0x104/0x1c0 [ib_core]\n\nstack backtrace:\nCPU: 4 PID: 293 Comm: systemd-modules Not tainted 6.8.0-rc3_net_next_841a9b5 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nCall Trace:\n <TASK>\n dump_stack_lvl+0x8a/0xa0\n lockdep_rcu_suspicious+0x154/0x1a0\n mlx5e_selq_apply+0x94/0xa0 [mlx5_core]\n mlx5e_selq_cleanup+0x3a/0x60 [mlx5_core]\n mlx5e_priv_init+0x2be/0x2f0 [mlx5_core]\n mlx5_rdma_setup_rn+0x7c/0x1a0 [mlx5_core]\n rdma_init_netdev+0x4e/0x80 [ib_core]\n ? mlx5_rdma_netdev_free+0x70/0x70 [mlx5_core]\n ipoib_intf_init+0x64/0x550 [ib_ipoib]\n ipoib_intf_alloc+0x4e/0xc0 [ib_ipoib]\n ipoib_add_one+0xb0/0x360 [ib_ipoib]\n add_client_context+0x112/0x1c0 [ib_core]\n ib_register_client+0x166/0x1b0 [ib_core]\n ? 0xffffffffa0573000\n ipoib_init_module+0xeb/0x1a0 [ib_ipoib]\n do_one_initcall+0x61/0x250\n do_init_module+0x8a/0x270\n init_module_from_file+0x8b/0xd0\n idempotent_init_module+0x17d/0x230\n __x64_sys_finit_module+0x61/0xb0\n do_syscall_64+0x71/0x140\n entry_SYSCALL_64_after_hwframe+0x46/0x4e\n </TASK>", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35959", url: "https://www.suse.com/security/cve/CVE-2024-35959", }, { category: "external", summary: "SUSE Bug 1224666 for CVE-2024-35959", url: "https://bugzilla.suse.com/1224666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35959", }, { cve: "CVE-2024-35963", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35963", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_sock: Fix not validating setsockopt user input\n\nCheck user input length before copying data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35963", url: "https://www.suse.com/security/cve/CVE-2024-35963", }, { category: "external", summary: "SUSE Bug 1224582 for CVE-2024-35963", url: "https://bugzilla.suse.com/1224582", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-35963", }, { cve: "CVE-2024-35964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35964", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix not validating setsockopt user input\n\nCheck user input length before copying data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35964", url: "https://www.suse.com/security/cve/CVE-2024-35964", }, { category: "external", summary: "SUSE Bug 1224581 for CVE-2024-35964", url: "https://bugzilla.suse.com/1224581", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35964", }, { cve: "CVE-2024-35965", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35965", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix not validating setsockopt user input\n\nCheck user input length before copying data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35965", url: "https://www.suse.com/security/cve/CVE-2024-35965", }, { category: "external", summary: "SUSE Bug 1224579 for CVE-2024-35965", url: "https://bugzilla.suse.com/1224579", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35965", }, { cve: "CVE-2024-35966", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35966", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: RFCOMM: Fix not validating setsockopt user input\n\nsyzbot reported rfcomm_sock_setsockopt_old() is copying data without\nchecking user input length.\n\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset\ninclude/linux/sockptr.h:49 [inline]\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr\ninclude/linux/sockptr.h:55 [inline]\nBUG: KASAN: slab-out-of-bounds in rfcomm_sock_setsockopt_old\nnet/bluetooth/rfcomm/sock.c:632 [inline]\nBUG: KASAN: slab-out-of-bounds in rfcomm_sock_setsockopt+0x893/0xa70\nnet/bluetooth/rfcomm/sock.c:673\nRead of size 4 at addr ffff8880209a8bc3 by task syz-executor632/5064", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35966", url: "https://www.suse.com/security/cve/CVE-2024-35966", }, { category: "external", summary: "SUSE Bug 1224576 for CVE-2024-35966", url: "https://bugzilla.suse.com/1224576", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35966", }, { cve: "CVE-2024-35967", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35967", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: SCO: Fix not validating setsockopt user input\n\nsyzbot reported sco_sock_setsockopt() is copying data without\nchecking user input length.\n\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset\ninclude/linux/sockptr.h:49 [inline]\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr\ninclude/linux/sockptr.h:55 [inline]\nBUG: KASAN: slab-out-of-bounds in sco_sock_setsockopt+0xc0b/0xf90\nnet/bluetooth/sco.c:893\nRead of size 4 at addr ffff88805f7b15a3 by task syz-executor.5/12578", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35967", url: "https://www.suse.com/security/cve/CVE-2024-35967", }, { category: "external", summary: "SUSE Bug 1224587 for CVE-2024-35967", url: "https://bugzilla.suse.com/1224587", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35967", }, { cve: "CVE-2024-35969", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35969", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr\n\nAlthough ipv6_get_ifaddr walks inet6_addr_lst under the RCU lock, it\nstill means hlist_for_each_entry_rcu can return an item that got removed\nfrom the list. The memory itself of such item is not freed thanks to RCU\nbut nothing guarantees the actual content of the memory is sane.\n\nIn particular, the reference count can be zero. This can happen if\nipv6_del_addr is called in parallel. ipv6_del_addr removes the entry\nfrom inet6_addr_lst (hlist_del_init_rcu(&ifp->addr_lst)) and drops all\nreferences (__in6_ifa_put(ifp) + in6_ifa_put(ifp)). With bad enough\ntiming, this can happen:\n\n1. In ipv6_get_ifaddr, hlist_for_each_entry_rcu returns an entry.\n\n2. Then, the whole ipv6_del_addr is executed for the given entry. The\n reference count drops to zero and kfree_rcu is scheduled.\n\n3. ipv6_get_ifaddr continues and tries to increments the reference count\n (in6_ifa_hold).\n\n4. The rcu is unlocked and the entry is freed.\n\n5. The freed entry is returned.\n\nPrevent increasing of the reference count in such case. The name\nin6_ifa_hold_safe is chosen to mimic the existing fib6_info_hold_safe.\n\n[ 41.506330] refcount_t: addition on 0; use-after-free.\n[ 41.506760] WARNING: CPU: 0 PID: 595 at lib/refcount.c:25 refcount_warn_saturate+0xa5/0x130\n[ 41.507413] Modules linked in: veth bridge stp llc\n[ 41.507821] CPU: 0 PID: 595 Comm: python3 Not tainted 6.9.0-rc2.main-00208-g49563be82afa #14\n[ 41.508479] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)\n[ 41.509163] RIP: 0010:refcount_warn_saturate+0xa5/0x130\n[ 41.509586] Code: ad ff 90 0f 0b 90 90 c3 cc cc cc cc 80 3d c0 30 ad 01 00 75 a0 c6 05 b7 30 ad 01 01 90 48 c7 c7 38 cc 7a 8c e8 cc 18 ad ff 90 <0f> 0b 90 90 c3 cc cc cc cc 80 3d 98 30 ad 01 00 0f 85 75 ff ff ff\n[ 41.510956] RSP: 0018:ffffbda3c026baf0 EFLAGS: 00010282\n[ 41.511368] RAX: 0000000000000000 RBX: ffff9e9c46914800 RCX: 0000000000000000\n[ 41.511910] RDX: ffff9e9c7ec29c00 RSI: ffff9e9c7ec1c900 RDI: ffff9e9c7ec1c900\n[ 41.512445] RBP: ffff9e9c43660c9c R08: 0000000000009ffb R09: 00000000ffffdfff\n[ 41.512998] R10: 00000000ffffdfff R11: ffffffff8ca58a40 R12: ffff9e9c4339a000\n[ 41.513534] R13: 0000000000000001 R14: ffff9e9c438a0000 R15: ffffbda3c026bb48\n[ 41.514086] FS: 00007fbc4cda1740(0000) GS:ffff9e9c7ec00000(0000) knlGS:0000000000000000\n[ 41.514726] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 41.515176] CR2: 000056233b337d88 CR3: 000000000376e006 CR4: 0000000000370ef0\n[ 41.515713] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 41.516252] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 41.516799] Call Trace:\n[ 41.517037] <TASK>\n[ 41.517249] ? __warn+0x7b/0x120\n[ 41.517535] ? refcount_warn_saturate+0xa5/0x130\n[ 41.517923] ? report_bug+0x164/0x190\n[ 41.518240] ? handle_bug+0x3d/0x70\n[ 41.518541] ? exc_invalid_op+0x17/0x70\n[ 41.520972] ? asm_exc_invalid_op+0x1a/0x20\n[ 41.521325] ? refcount_warn_saturate+0xa5/0x130\n[ 41.521708] ipv6_get_ifaddr+0xda/0xe0\n[ 41.522035] inet6_rtm_getaddr+0x342/0x3f0\n[ 41.522376] ? __pfx_inet6_rtm_getaddr+0x10/0x10\n[ 41.522758] rtnetlink_rcv_msg+0x334/0x3d0\n[ 41.523102] ? netlink_unicast+0x30f/0x390\n[ 41.523445] ? __pfx_rtnetlink_rcv_msg+0x10/0x10\n[ 41.523832] netlink_rcv_skb+0x53/0x100\n[ 41.524157] netlink_unicast+0x23b/0x390\n[ 41.524484] netlink_sendmsg+0x1f2/0x440\n[ 41.524826] __sys_sendto+0x1d8/0x1f0\n[ 41.525145] __x64_sys_sendto+0x1f/0x30\n[ 41.525467] do_syscall_64+0xa5/0x1b0\n[ 41.525794] entry_SYSCALL_64_after_hwframe+0x72/0x7a\n[ 41.526213] RIP: 0033:0x7fbc4cfcea9a\n[ 41.526528] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89\n[ 41.527942] RSP: 002b:00007f\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35969", url: "https://www.suse.com/security/cve/CVE-2024-35969", }, { category: "external", summary: "SUSE Bug 1224580 for CVE-2024-35969", url: "https://bugzilla.suse.com/1224580", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35969", }, { cve: "CVE-2024-35973", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35973", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ngeneve: fix header validation in geneve[6]_xmit_skb\n\nsyzbot is able to trigger an uninit-value in geneve_xmit() [1]\n\nProblem : While most ip tunnel helpers (like ip_tunnel_get_dsfield())\nuses skb_protocol(skb, true), pskb_inet_may_pull() is only using\nskb->protocol.\n\nIf anything else than ETH_P_IPV6 or ETH_P_IP is found in skb->protocol,\npskb_inet_may_pull() does nothing at all.\n\nIf a vlan tag was provided by the caller (af_packet in the syzbot case),\nthe network header might not point to the correct location, and skb\nlinear part could be smaller than expected.\n\nAdd skb_vlan_inet_prepare() to perform a complete mac validation.\n\nUse this in geneve for the moment, I suspect we need to adopt this\nmore broadly.\n\nv4 - Jakub reported v3 broke l2_tos_ttl_inherit.sh selftest\n - Only call __vlan_get_protocol() for vlan types.\n\nv2,v3 - Addressed Sabrina comments on v1 and v2\n\n[1]\n\nBUG: KMSAN: uninit-value in geneve_xmit_skb drivers/net/geneve.c:910 [inline]\n BUG: KMSAN: uninit-value in geneve_xmit+0x302d/0x5420 drivers/net/geneve.c:1030\n geneve_xmit_skb drivers/net/geneve.c:910 [inline]\n geneve_xmit+0x302d/0x5420 drivers/net/geneve.c:1030\n __netdev_start_xmit include/linux/netdevice.h:4903 [inline]\n netdev_start_xmit include/linux/netdevice.h:4917 [inline]\n xmit_one net/core/dev.c:3531 [inline]\n dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3547\n __dev_queue_xmit+0x348d/0x52c0 net/core/dev.c:4335\n dev_queue_xmit include/linux/netdevice.h:3091 [inline]\n packet_xmit+0x9c/0x6c0 net/packet/af_packet.c:276\n packet_snd net/packet/af_packet.c:3081 [inline]\n packet_sendmsg+0x8bb0/0x9ef0 net/packet/af_packet.c:3113\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x30f/0x380 net/socket.c:745\n __sys_sendto+0x685/0x830 net/socket.c:2191\n __do_sys_sendto net/socket.c:2203 [inline]\n __se_sys_sendto net/socket.c:2199 [inline]\n __x64_sys_sendto+0x125/0x1d0 net/socket.c:2199\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:3804 [inline]\n slab_alloc_node mm/slub.c:3845 [inline]\n kmem_cache_alloc_node+0x613/0xc50 mm/slub.c:3888\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:577\n __alloc_skb+0x35b/0x7a0 net/core/skbuff.c:668\n alloc_skb include/linux/skbuff.h:1318 [inline]\n alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6504\n sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2795\n packet_alloc_skb net/packet/af_packet.c:2930 [inline]\n packet_snd net/packet/af_packet.c:3024 [inline]\n packet_sendmsg+0x722d/0x9ef0 net/packet/af_packet.c:3113\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x30f/0x380 net/socket.c:745\n __sys_sendto+0x685/0x830 net/socket.c:2191\n __do_sys_sendto net/socket.c:2203 [inline]\n __se_sys_sendto net/socket.c:2199 [inline]\n __x64_sys_sendto+0x125/0x1d0 net/socket.c:2199\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nCPU: 0 PID: 5033 Comm: syz-executor346 Not tainted 6.9.0-rc1-syzkaller-00005-g928a87efa423 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35973", url: "https://www.suse.com/security/cve/CVE-2024-35973", }, { category: "external", summary: "SUSE Bug 1224586 for CVE-2024-35973", url: "https://bugzilla.suse.com/1224586", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35973", }, { cve: "CVE-2024-35976", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35976", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING\n\nsyzbot reported an illegal copy in xsk_setsockopt() [1]\n\nMake sure to validate setsockopt() @optlen parameter.\n\n[1]\n\n BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]\n BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]\n BUG: KASAN: slab-out-of-bounds in xsk_setsockopt+0x909/0xa40 net/xdp/xsk.c:1420\nRead of size 4 at addr ffff888028c6cde3 by task syz-executor.0/7549\n\nCPU: 0 PID: 7549 Comm: syz-executor.0 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:488\n kasan_report+0x143/0x180 mm/kasan/report.c:601\n copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]\n copy_from_sockptr include/linux/sockptr.h:55 [inline]\n xsk_setsockopt+0x909/0xa40 net/xdp/xsk.c:1420\n do_sock_setsockopt+0x3af/0x720 net/socket.c:2311\n __sys_setsockopt+0x1ae/0x250 net/socket.c:2334\n __do_sys_setsockopt net/socket.c:2343 [inline]\n __se_sys_setsockopt net/socket.c:2340 [inline]\n __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340\n do_syscall_64+0xfb/0x240\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\nRIP: 0033:0x7fb40587de69\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fb40665a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036\nRAX: ffffffffffffffda RBX: 00007fb4059abf80 RCX: 00007fb40587de69\nRDX: 0000000000000005 RSI: 000000000000011b RDI: 0000000000000006\nRBP: 00007fb4058ca47a R08: 0000000000000002 R09: 0000000000000000\nR10: 0000000020001980 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000000b R14: 00007fb4059abf80 R15: 00007fff57ee4d08\n </TASK>\n\nAllocated by task 7549:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:370 [inline]\n __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387\n kasan_kmalloc include/linux/kasan.h:211 [inline]\n __do_kmalloc_node mm/slub.c:3966 [inline]\n __kmalloc+0x233/0x4a0 mm/slub.c:3979\n kmalloc include/linux/slab.h:632 [inline]\n __cgroup_bpf_run_filter_setsockopt+0xd2f/0x1040 kernel/bpf/cgroup.c:1869\n do_sock_setsockopt+0x6b4/0x720 net/socket.c:2293\n __sys_setsockopt+0x1ae/0x250 net/socket.c:2334\n __do_sys_setsockopt net/socket.c:2343 [inline]\n __se_sys_setsockopt net/socket.c:2340 [inline]\n __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340\n do_syscall_64+0xfb/0x240\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nThe buggy address belongs to the object at ffff888028c6cde0\n which belongs to the cache kmalloc-8 of size 8\nThe buggy address is located 1 bytes to the right of\n allocated 2-byte region [ffff888028c6cde0, ffff888028c6cde2)\n\nThe buggy address belongs to the physical page:\npage:ffffea0000a31b00 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888028c6c9c0 pfn:0x28c6c\nanon flags: 0xfff00000000800(slab|node=0|zone=1|lastcpupid=0x7ff)\npage_type: 0xffffffff()\nraw: 00fff00000000800 ffff888014c41280 0000000000000000 dead000000000001\nraw: ffff888028c6c9c0 0000000080800057 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as allocated\npage last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 6648, tgid 6644 (syz-executor.0), ts 133906047828, free_ts 133859922223\n set_page_owner include/linux/page_owner.h:31 [inline]\n post_alloc_hook+0x1ea/0x210 mm/page_alloc.c:1533\n prep_new_page mm/page_alloc.c:\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35976", url: "https://www.suse.com/security/cve/CVE-2024-35976", }, { category: "external", summary: "SUSE Bug 1224575 for CVE-2024-35976", url: "https://bugzilla.suse.com/1224575", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35976", }, { cve: "CVE-2024-35978", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35978", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix memory leak in hci_req_sync_complete()\n\nIn 'hci_req_sync_complete()', always free the previous sync\nrequest state before assigning reference to a new one.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35978", url: "https://www.suse.com/security/cve/CVE-2024-35978", }, { category: "external", summary: "SUSE Bug 1224571 for CVE-2024-35978", url: "https://bugzilla.suse.com/1224571", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35978", }, { cve: "CVE-2024-35982", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35982", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbatman-adv: Avoid infinite loop trying to resize local TT\n\nIf the MTU of one of an attached interface becomes too small to transmit\nthe local translation table then it must be resized to fit inside all\nfragments (when enabled) or a single packet.\n\nBut if the MTU becomes too low to transmit even the header + the VLAN\nspecific part then the resizing of the local TT will never succeed. This\ncan for example happen when the usable space is 110 bytes and 11 VLANs are\non top of batman-adv. In this case, at least 116 byte would be needed.\nThere will just be an endless spam of\n\n batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (110)\n\nin the log but the function will never finish. Problem here is that the\ntimeout will be halved all the time and will then stagnate at 0 and\ntherefore never be able to reduce the table even more.\n\nThere are other scenarios possible with a similar result. The number of\nBATADV_TT_CLIENT_NOPURGE entries in the local TT can for example be too\nhigh to fit inside a packet. Such a scenario can therefore happen also with\nonly a single VLAN + 7 non-purgable addresses - requiring at least 120\nbytes.\n\nWhile this should be handled proactively when:\n\n* interface with too low MTU is added\n* VLAN is added\n* non-purgeable local mac is added\n* MTU of an attached interface is reduced\n* fragmentation setting gets disabled (which most likely requires dropping\n attached interfaces)\n\nnot all of these scenarios can be prevented because batman-adv is only\nconsuming events without the the possibility to prevent these actions\n(non-purgable MAC address added, MTU of an attached interface is reduced).\nIt is therefore necessary to also make sure that the code is able to handle\nalso the situations when there were already incompatible system\nconfiguration are present.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35982", url: "https://www.suse.com/security/cve/CVE-2024-35982", }, { category: "external", summary: "SUSE Bug 1224566 for CVE-2024-35982", url: "https://bugzilla.suse.com/1224566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35982", }, { cve: "CVE-2024-35984", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35984", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: smbus: fix NULL function pointer dereference\n\nBaruch reported an OOPS when using the designware controller as target\nonly. Target-only modes break the assumption of one transfer function\nalways being available. Fix this by always checking the pointer in\n__i2c_transfer.\n\n[wsa: dropped the simplification in core-smbus to avoid theoretical regressions]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35984", url: "https://www.suse.com/security/cve/CVE-2024-35984", }, { category: "external", summary: "SUSE Bug 1224567 for CVE-2024-35984", url: "https://bugzilla.suse.com/1224567", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35984", }, { cve: "CVE-2024-35989", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35989", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: idxd: Fix oops during rmmod on single-CPU platforms\n\nDuring the removal of the idxd driver, registered offline callback is\ninvoked as part of the clean up process. However, on systems with only\none CPU online, no valid target is available to migrate the\nperf context, resulting in a kernel oops:\n\n BUG: unable to handle page fault for address: 000000000002a2b8\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD 1470e1067 P4D 0\n Oops: 0002 [#1] PREEMPT SMP NOPTI\n CPU: 0 PID: 20 Comm: cpuhp/0 Not tainted 6.8.0-rc6-dsa+ #57\n Hardware name: Intel Corporation AvenueCity/AvenueCity, BIOS BHSDCRB1.86B.2492.D03.2307181620 07/18/2023\n RIP: 0010:mutex_lock+0x2e/0x50\n ...\n Call Trace:\n <TASK>\n __die+0x24/0x70\n page_fault_oops+0x82/0x160\n do_user_addr_fault+0x65/0x6b0\n __pfx___rdmsr_safe_on_cpu+0x10/0x10\n exc_page_fault+0x7d/0x170\n asm_exc_page_fault+0x26/0x30\n mutex_lock+0x2e/0x50\n mutex_lock+0x1e/0x50\n perf_pmu_migrate_context+0x87/0x1f0\n perf_event_cpu_offline+0x76/0x90 [idxd]\n cpuhp_invoke_callback+0xa2/0x4f0\n __pfx_perf_event_cpu_offline+0x10/0x10 [idxd]\n cpuhp_thread_fun+0x98/0x150\n smpboot_thread_fn+0x27/0x260\n smpboot_thread_fn+0x1af/0x260\n __pfx_smpboot_thread_fn+0x10/0x10\n kthread+0x103/0x140\n __pfx_kthread+0x10/0x10\n ret_from_fork+0x31/0x50\n __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1b/0x30\n <TASK>\n\nFix the issue by preventing the migration of the perf context to an\ninvalid target.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35989", url: "https://www.suse.com/security/cve/CVE-2024-35989", }, { category: "external", summary: "SUSE Bug 1224558 for CVE-2024-35989", url: "https://bugzilla.suse.com/1224558", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35989", }, { cve: "CVE-2024-35990", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35990", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndma: xilinx_dpdma: Fix locking\n\nThere are several places where either chan->lock or chan->vchan.lock was\nnot held. Add appropriate locking. This fixes lockdep warnings like\n\n[ 31.077578] ------------[ cut here ]------------\n[ 31.077831] WARNING: CPU: 2 PID: 40 at drivers/dma/xilinx/xilinx_dpdma.c:834 xilinx_dpdma_chan_queue_transfer+0x274/0x5e0\n[ 31.077953] Modules linked in:\n[ 31.078019] CPU: 2 PID: 40 Comm: kworker/u12:1 Not tainted 6.6.20+ #98\n[ 31.078102] Hardware name: xlnx,zynqmp (DT)\n[ 31.078169] Workqueue: events_unbound deferred_probe_work_func\n[ 31.078272] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 31.078377] pc : xilinx_dpdma_chan_queue_transfer+0x274/0x5e0\n[ 31.078473] lr : xilinx_dpdma_chan_queue_transfer+0x270/0x5e0\n[ 31.078550] sp : ffffffc083bb2e10\n[ 31.078590] x29: ffffffc083bb2e10 x28: 0000000000000000 x27: ffffff880165a168\n[ 31.078754] x26: ffffff880164e920 x25: ffffff880164eab8 x24: ffffff880164d480\n[ 31.078920] x23: ffffff880165a148 x22: ffffff880164e988 x21: 0000000000000000\n[ 31.079132] x20: ffffffc082aa3000 x19: ffffff880164e880 x18: 0000000000000000\n[ 31.079295] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\n[ 31.079453] x14: 0000000000000000 x13: ffffff8802263dc0 x12: 0000000000000001\n[ 31.079613] x11: 0001ffc083bb2e34 x10: 0001ff880164e98f x9 : 0001ffc082aa3def\n[ 31.079824] x8 : 0001ffc082aa3dec x7 : 0000000000000000 x6 : 0000000000000516\n[ 31.079982] x5 : ffffffc7f8d43000 x4 : ffffff88003c9c40 x3 : ffffffffffffffff\n[ 31.080147] x2 : ffffffc7f8d43000 x1 : 00000000000000c0 x0 : 0000000000000000\n[ 31.080307] Call trace:\n[ 31.080340] xilinx_dpdma_chan_queue_transfer+0x274/0x5e0\n[ 31.080518] xilinx_dpdma_issue_pending+0x11c/0x120\n[ 31.080595] zynqmp_disp_layer_update+0x180/0x3ac\n[ 31.080712] zynqmp_dpsub_plane_atomic_update+0x11c/0x21c\n[ 31.080825] drm_atomic_helper_commit_planes+0x20c/0x684\n[ 31.080951] drm_atomic_helper_commit_tail+0x5c/0xb0\n[ 31.081139] commit_tail+0x234/0x294\n[ 31.081246] drm_atomic_helper_commit+0x1f8/0x210\n[ 31.081363] drm_atomic_commit+0x100/0x140\n[ 31.081477] drm_client_modeset_commit_atomic+0x318/0x384\n[ 31.081634] drm_client_modeset_commit_locked+0x8c/0x24c\n[ 31.081725] drm_client_modeset_commit+0x34/0x5c\n[ 31.081812] __drm_fb_helper_restore_fbdev_mode_unlocked+0x104/0x168\n[ 31.081899] drm_fb_helper_set_par+0x50/0x70\n[ 31.081971] fbcon_init+0x538/0xc48\n[ 31.082047] visual_init+0x16c/0x23c\n[ 31.082207] do_bind_con_driver.isra.0+0x2d0/0x634\n[ 31.082320] do_take_over_console+0x24c/0x33c\n[ 31.082429] do_fbcon_takeover+0xbc/0x1b0\n[ 31.082503] fbcon_fb_registered+0x2d0/0x34c\n[ 31.082663] register_framebuffer+0x27c/0x38c\n[ 31.082767] __drm_fb_helper_initial_config_and_unlock+0x5c0/0x91c\n[ 31.082939] drm_fb_helper_initial_config+0x50/0x74\n[ 31.083012] drm_fbdev_dma_client_hotplug+0xb8/0x108\n[ 31.083115] drm_client_register+0xa0/0xf4\n[ 31.083195] drm_fbdev_dma_setup+0xb0/0x1cc\n[ 31.083293] zynqmp_dpsub_drm_init+0x45c/0x4e0\n[ 31.083431] zynqmp_dpsub_probe+0x444/0x5e0\n[ 31.083616] platform_probe+0x8c/0x13c\n[ 31.083713] really_probe+0x258/0x59c\n[ 31.083793] __driver_probe_device+0xc4/0x224\n[ 31.083878] driver_probe_device+0x70/0x1c0\n[ 31.083961] __device_attach_driver+0x108/0x1e0\n[ 31.084052] bus_for_each_drv+0x9c/0x100\n[ 31.084125] __device_attach+0x100/0x298\n[ 31.084207] device_initial_probe+0x14/0x20\n[ 31.084292] bus_probe_device+0xd8/0xdc\n[ 31.084368] deferred_probe_work_func+0x11c/0x180\n[ 31.084451] process_one_work+0x3ac/0x988\n[ 31.084643] worker_thread+0x398/0x694\n[ 31.084752] kthread+0x1bc/0x1c0\n[ 31.084848] ret_from_fork+0x10/0x20\n[ 31.084932] irq event stamp: 64549\n[ 31.084970] hardirqs last enabled at (64548): [<ffffffc081adf35c>] _raw_spin_unlock_irqrestore+0x80/0x90\n[ 31.085157]\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35990", url: "https://www.suse.com/security/cve/CVE-2024-35990", }, { category: "external", summary: "SUSE Bug 1224559 for CVE-2024-35990", url: "https://bugzilla.suse.com/1224559", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35990", }, { cve: "CVE-2024-35998", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35998", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix lock ordering potential deadlock in cifs_sync_mid_result\n\nCoverity spotted that the cifs_sync_mid_result function could deadlock\n\n\"Thread deadlock (ORDER_REVERSAL) lock_order: Calling spin_lock acquires\nlock TCP_Server_Info.srv_lock while holding lock TCP_Server_Info.mid_lock\"\n\nAddresses-Coverity: 1590401 (\"Thread deadlock (ORDER_REVERSAL)\")", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35998", url: "https://www.suse.com/security/cve/CVE-2024-35998", }, { category: "external", summary: "SUSE Bug 1224549 for CVE-2024-35998", url: "https://bugzilla.suse.com/1224549", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35998", }, { cve: "CVE-2024-35999", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35999", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: missing lock when picking channel\n\nCoverity spotted a place where we should have been holding the\nchannel lock when accessing the ses channel index.\n\nAddresses-Coverity: 1582039 (\"Data race condition (MISSING_LOCK)\")", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35999", url: "https://www.suse.com/security/cve/CVE-2024-35999", }, { category: "external", summary: "SUSE Bug 1224550 for CVE-2024-35999", url: "https://bugzilla.suse.com/1224550", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-35999", }, { cve: "CVE-2024-36006", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36006", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix incorrect list API usage\n\nBoth the function that migrates all the chunks within a region and the\nfunction that migrates all the entries within a chunk call\nlist_first_entry() on the respective lists without checking that the\nlists are not empty. This is incorrect usage of the API, which leads to\nthe following warning [1].\n\nFix by returning if the lists are empty as there is nothing to migrate\nin this case.\n\n[1]\nWARNING: CPU: 0 PID: 6437 at drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c:1266 mlxsw_sp_acl_tcam_vchunk_migrate_all+0x1f1/0>\nModules linked in:\nCPU: 0 PID: 6437 Comm: kworker/0:37 Not tainted 6.9.0-rc3-custom-00883-g94a65f079ef6 #39\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work\nRIP: 0010:mlxsw_sp_acl_tcam_vchunk_migrate_all+0x1f1/0x2c0\n[...]\nCall Trace:\n <TASK>\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x6c/0x4a0\n process_one_work+0x151/0x370\n worker_thread+0x2cb/0x3e0\n kthread+0xd0/0x100\n ret_from_fork+0x34/0x50\n ret_from_fork_asm+0x1a/0x30\n </TASK>", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36006", url: "https://www.suse.com/security/cve/CVE-2024-36006", }, { category: "external", summary: "SUSE Bug 1224541 for CVE-2024-36006", url: "https://bugzilla.suse.com/1224541", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36006", }, { cve: "CVE-2024-36007", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36007", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix warning during rehash\n\nAs previously explained, the rehash delayed work migrates filters from\none region to another. This is done by iterating over all chunks (all\nthe filters with the same priority) in the region and in each chunk\niterating over all the filters.\n\nWhen the work runs out of credits it stores the current chunk and entry\nas markers in the per-work context so that it would know where to resume\nthe migration from the next time the work is scheduled.\n\nUpon error, the chunk marker is reset to NULL, but without resetting the\nentry markers despite being relative to it. This can result in migration\nbeing resumed from an entry that does not belong to the chunk being\nmigrated. In turn, this will eventually lead to a chunk being iterated\nover as if it is an entry. Because of how the two structures happen to\nbe defined, this does not lead to KASAN splats, but to warnings such as\n[1].\n\nFix by creating a helper that resets all the markers and call it from\nall the places the currently only reset the chunk marker. For good\nmeasures also call it when starting a completely new rehash. Add a\nwarning to avoid future cases.\n\n[1]\nWARNING: CPU: 7 PID: 1076 at drivers/net/ethernet/mellanox/mlxsw/core_acl_flex_keys.c:407 mlxsw_afk_encode+0x242/0x2f0\nModules linked in:\nCPU: 7 PID: 1076 Comm: kworker/7:24 Tainted: G W 6.9.0-rc3-custom-00880-g29e61d91b77b #29\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work\nRIP: 0010:mlxsw_afk_encode+0x242/0x2f0\n[...]\nCall Trace:\n <TASK>\n mlxsw_sp_acl_atcam_entry_add+0xd9/0x3c0\n mlxsw_sp_acl_tcam_entry_create+0x5e/0xa0\n mlxsw_sp_acl_tcam_vchunk_migrate_all+0x109/0x290\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x6c/0x470\n process_one_work+0x151/0x370\n worker_thread+0x2cb/0x3e0\n kthread+0xd0/0x100\n ret_from_fork+0x34/0x50\n </TASK>", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36007", url: "https://www.suse.com/security/cve/CVE-2024-36007", }, { category: "external", summary: "SUSE Bug 1224543 for CVE-2024-36007", url: "https://bugzilla.suse.com/1224543", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36007", }, { cve: "CVE-2024-36012", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36012", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: msft: fix slab-use-after-free in msft_do_close()\n\nTying the msft->data lifetime to hdev by freeing it in\nhci_release_dev() to fix the following case:\n\n[use]\nmsft_do_close()\n msft = hdev->msft_data;\n if (!msft) ...(1) <- passed.\n return;\n mutex_lock(&msft->filter_lock); ...(4) <- used after freed.\n\n[free]\nmsft_unregister()\n msft = hdev->msft_data;\n hdev->msft_data = NULL; ...(2)\n kfree(msft); ...(3) <- msft is freed.\n\n==================================================================\nBUG: KASAN: slab-use-after-free in __mutex_lock_common\nkernel/locking/mutex.c:587 [inline]\nBUG: KASAN: slab-use-after-free in __mutex_lock+0x8f/0xc30\nkernel/locking/mutex.c:752\nRead of size 8 at addr ffff888106cbbca8 by task kworker/u5:2/309", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36012", url: "https://www.suse.com/security/cve/CVE-2024-36012", }, { category: "external", summary: "SUSE Bug 1225502 for CVE-2024-36012", url: "https://bugzilla.suse.com/1225502", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36012", }, { cve: "CVE-2024-36014", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36014", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/arm/malidp: fix a possible null pointer dereference\n\nIn malidp_mw_connector_reset, new memory is allocated with kzalloc, but\nno check is performed. In order to prevent null pointer dereferencing,\nensure that mw_state is checked before calling\n__drm_atomic_helper_connector_reset.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36014", url: "https://www.suse.com/security/cve/CVE-2024-36014", }, { category: "external", summary: "SUSE Bug 1225593 for CVE-2024-36014", url: "https://bugzilla.suse.com/1225593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36014", }, { cve: "CVE-2024-36015", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36015", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nppdev: Add an error check in register_device\n\nIn register_device, the return value of ida_simple_get is unchecked,\nin witch ida_simple_get will use an invalid index value.\n\nTo address this issue, index should be checked after ida_simple_get. When\nthe index value is abnormal, a warning message should be printed, the port\nshould be dropped, and the value should be recorded.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36015", url: "https://www.suse.com/security/cve/CVE-2024-36015", }, { category: "external", summary: "SUSE Bug 1225640 for CVE-2024-36015", url: "https://bugzilla.suse.com/1225640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36015", }, { cve: "CVE-2024-36016", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36016", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: fix possible out-of-bounds in gsm0_receive()\n\nAssuming the following:\n- side A configures the n_gsm in basic option mode\n- side B sends the header of a basic option mode frame with data length 1\n- side A switches to advanced option mode\n- side B sends 2 data bytes which exceeds gsm->len\n Reason: gsm->len is not used in advanced option mode.\n- side A switches to basic option mode\n- side B keeps sending until gsm0_receive() writes past gsm->buf\n Reason: Neither gsm->state nor gsm->len have been reset after\n reconfiguration.\n\nFix this by changing gsm->count to gsm->len comparison from equal to less\nthan. Also add upper limit checks against the constant MAX_MRU in\ngsm0_receive() and gsm1_receive() to harden against memory corruption of\ngsm->len and gsm->mru.\n\nAll other checks remain as we still need to limit the data according to the\nuser configuration and actual payload size.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36016", url: "https://www.suse.com/security/cve/CVE-2024-36016", }, { category: "external", summary: "SUSE Bug 1225642 for CVE-2024-36016", url: "https://bugzilla.suse.com/1225642", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36016", }, { cve: "CVE-2024-36026", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36026", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11\n\nWhile doing multiple S4 stress tests, GC/RLC/PMFW get into\nan invalid state resulting into hard hangs.\n\nAdding a GFX reset as workaround just before sending the\nMP1_UNLOAD message avoids this failure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36026", url: "https://www.suse.com/security/cve/CVE-2024-36026", }, { category: "external", summary: "SUSE Bug 1225705 for CVE-2024-36026", url: "https://bugzilla.suse.com/1225705", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36026", }, { cve: "CVE-2024-36029", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36029", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdhci-msm: pervent access to suspended controller\n\nGeneric sdhci code registers LED device and uses host->runtime_suspended\nflag to protect access to it. The sdhci-msm driver doesn't set this flag,\nwhich causes a crash when LED is accessed while controller is runtime\nsuspended. Fix this by setting the flag correctly.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36029", url: "https://www.suse.com/security/cve/CVE-2024-36029", }, { category: "external", summary: "SUSE Bug 1225708 for CVE-2024-36029", url: "https://bugzilla.suse.com/1225708", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36029", }, { cve: "CVE-2024-36032", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36032", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: qca: fix info leak when fetching fw build id\n\nAdd the missing sanity checks and move the 255-byte build-id buffer off\nthe stack to avoid leaking stack data through debugfs in case the\nbuild-info reply is malformed.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36032", url: "https://www.suse.com/security/cve/CVE-2024-36032", }, { category: "external", summary: "SUSE Bug 1225720 for CVE-2024-36032", url: "https://bugzilla.suse.com/1225720", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-36032", }, { cve: "CVE-2024-36880", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36880", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: qca: add missing firmware sanity checks\n\nAdd the missing sanity checks when parsing the firmware files before\ndownloading them to avoid accessing and corrupting memory beyond the\nvmalloced buffer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36880", url: "https://www.suse.com/security/cve/CVE-2024-36880", }, { category: "external", summary: "SUSE Bug 1225722 for CVE-2024-36880", url: "https://bugzilla.suse.com/1225722", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36880", }, { cve: "CVE-2024-36893", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36893", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: tcpm: Check for port partner validity before consuming it\n\ntypec_register_partner() does not guarantee partner registration\nto always succeed. In the event of failure, port->partner is set\nto the error value or NULL. Given that port->partner validity is\nnot checked, this results in the following crash:\n\nUnable to handle kernel NULL pointer dereference at virtual address xx\n pc : run_state_machine+0x1bc8/0x1c08\n lr : run_state_machine+0x1b90/0x1c08\n..\n Call trace:\n run_state_machine+0x1bc8/0x1c08\n tcpm_state_machine_work+0x94/0xe4\n kthread_worker_fn+0x118/0x328\n kthread+0x1d0/0x23c\n ret_from_fork+0x10/0x20\n\nTo prevent the crash, check for port->partner validity before\nderefencing it in all the call sites.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36893", url: "https://www.suse.com/security/cve/CVE-2024-36893", }, { category: "external", summary: "SUSE Bug 1225748 for CVE-2024-36893", url: "https://bugzilla.suse.com/1225748", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36893", }, { cve: "CVE-2024-36896", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36896", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix access violation during port device removal\n\nTesting with KASAN and syzkaller revealed a bug in port.c:disable_store():\nusb_hub_to_struct_hub() can return NULL if the hub that the port belongs to\nis concurrently removed, but the function does not check for this\npossibility before dereferencing the returned value.\n\nIt turns out that the first dereference is unnecessary, since hub->intfdev\nis the parent of the port device, so it can be changed easily. Adding a\ncheck for hub == NULL prevents further problems.\n\nThe same bug exists in the disable_show() routine, and it can be fixed the\nsame way.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36896", url: "https://www.suse.com/security/cve/CVE-2024-36896", }, { category: "external", summary: "SUSE Bug 1225734 for CVE-2024-36896", url: "https://bugzilla.suse.com/1225734", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36896", }, { cve: "CVE-2024-36897", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36897", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Atom Integrated System Info v2_2 for DCN35\n\nNew request from KMD/VBIOS in order to support new UMA carveout\nmodel. This fixes a null dereference from accessing\nCtx->dc_bios->integrated_info while it was NULL.\n\nDAL parses through the BIOS and extracts the necessary\nintegrated_info but was missing a case for the new BIOS\nversion 2.3.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36897", url: "https://www.suse.com/security/cve/CVE-2024-36897", }, { category: "external", summary: "SUSE Bug 1225735 for CVE-2024-36897", url: "https://bugzilla.suse.com/1225735", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36897", }, { cve: "CVE-2024-36906", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36906", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: 9381/1: kasan: clear stale stack poison\n\nWe found below OOB crash:\n\n[ 33.452494] ==================================================================\n[ 33.453513] BUG: KASAN: stack-out-of-bounds in refresh_cpu_vm_stats.constprop.0+0xcc/0x2ec\n[ 33.454660] Write of size 164 at addr c1d03d30 by task swapper/0/0\n[ 33.455515]\n[ 33.455767] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G O 6.1.25-mainline #1\n[ 33.456880] Hardware name: Generic DT based system\n[ 33.457555] unwind_backtrace from show_stack+0x18/0x1c\n[ 33.458326] show_stack from dump_stack_lvl+0x40/0x4c\n[ 33.459072] dump_stack_lvl from print_report+0x158/0x4a4\n[ 33.459863] print_report from kasan_report+0x9c/0x148\n[ 33.460616] kasan_report from kasan_check_range+0x94/0x1a0\n[ 33.461424] kasan_check_range from memset+0x20/0x3c\n[ 33.462157] memset from refresh_cpu_vm_stats.constprop.0+0xcc/0x2ec\n[ 33.463064] refresh_cpu_vm_stats.constprop.0 from tick_nohz_idle_stop_tick+0x180/0x53c\n[ 33.464181] tick_nohz_idle_stop_tick from do_idle+0x264/0x354\n[ 33.465029] do_idle from cpu_startup_entry+0x20/0x24\n[ 33.465769] cpu_startup_entry from rest_init+0xf0/0xf4\n[ 33.466528] rest_init from arch_post_acpi_subsys_init+0x0/0x18\n[ 33.467397]\n[ 33.467644] The buggy address belongs to stack of task swapper/0/0\n[ 33.468493] and is located at offset 112 in frame:\n[ 33.469172] refresh_cpu_vm_stats.constprop.0+0x0/0x2ec\n[ 33.469917]\n[ 33.470165] This frame has 2 objects:\n[ 33.470696] [32, 76) 'global_zone_diff'\n[ 33.470729] [112, 276) 'global_node_diff'\n[ 33.471294]\n[ 33.472095] The buggy address belongs to the physical page:\n[ 33.472862] page:3cd72da8 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x41d03\n[ 33.473944] flags: 0x1000(reserved|zone=0)\n[ 33.474565] raw: 00001000 ed741470 ed741470 00000000 00000000 00000000 ffffffff 00000001\n[ 33.475656] raw: 00000000\n[ 33.476050] page dumped because: kasan: bad access detected\n[ 33.476816]\n[ 33.477061] Memory state around the buggy address:\n[ 33.477732] c1d03c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 33.478630] c1d03c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00\n[ 33.479526] >c1d03d00: 00 04 f2 f2 f2 f2 00 00 00 00 00 00 f1 f1 f1 f1\n[ 33.480415] ^\n[ 33.481195] c1d03d80: 00 00 00 00 00 00 00 00 00 00 04 f3 f3 f3 f3 f3\n[ 33.482088] c1d03e00: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00\n[ 33.482978] ==================================================================\n\nWe find the root cause of this OOB is that arm does not clear stale stack\npoison in the case of cpuidle.\n\nThis patch refer to arch/arm64/kernel/sleep.S to resolve this issue.\n\nFrom cited commit [1] that explain the problem\n\nFunctions which the compiler has instrumented for KASAN place poison on\nthe stack shadow upon entry and remove this poison prior to returning.\n\nIn the case of cpuidle, CPUs exit the kernel a number of levels deep in\nC code. Any instrumented functions on this critical path will leave\nportions of the stack shadow poisoned.\n\nIf CPUs lose context and return to the kernel via a cold path, we\nrestore a prior context saved in __cpu_suspend_enter are forgotten, and\nwe never remove the poison they placed in the stack shadow area by\nfunctions calls between this and the actual exit of the kernel.\n\nThus, (depending on stackframe layout) subsequent calls to instrumented\nfunctions may hit this stale poison, resulting in (spurious) KASAN\nsplats to the console.\n\nTo avoid this, clear any stale poison from the idle thread for a CPU\nprior to bringing a CPU online.\n\nFrom cited commit [2]\n\nExtend to check for CONFIG_KASAN_STACK\n\n[1] commit 0d97e6d8024c (\"arm64: kasan: clear stale stack poison\")\n[2] commit d56a9ef84bd0 (\"kasan, arm64: unpoison stack only with CONFIG_KASAN_STACK\")", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36906", url: "https://www.suse.com/security/cve/CVE-2024-36906", }, { category: "external", summary: "SUSE Bug 1225715 for CVE-2024-36906", url: "https://bugzilla.suse.com/1225715", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 0, baseSeverity: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-36906", }, { cve: "CVE-2024-36918", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36918", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check bloom filter map value size\n\nThis patch adds a missing check to bloom filter creating, rejecting\nvalues above KMALLOC_MAX_SIZE. This brings the bloom map in line with\nmany other map types.\n\nThe lack of this protection can cause kernel crashes for value sizes\nthat overflow int's. Such a crash was caught by syzkaller. The next\npatch adds more guard-rails at a lower level.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36918", url: "https://www.suse.com/security/cve/CVE-2024-36918", }, { category: "external", summary: "SUSE Bug 1225766 for CVE-2024-36918", url: "https://bugzilla.suse.com/1225766", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36918", }, { cve: "CVE-2024-36924", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36924", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()\n\nlpfc_worker_wake_up() calls the lpfc_work_done() routine, which takes the\nhbalock. Thus, lpfc_worker_wake_up() should not be called while holding the\nhbalock to avoid potential deadlock.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36924", url: "https://www.suse.com/security/cve/CVE-2024-36924", }, { category: "external", summary: "SUSE Bug 1225820 for CVE-2024-36924", url: "https://bugzilla.suse.com/1225820", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36924", }, { cve: "CVE-2024-36926", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36926", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries/iommu: LPAR panics during boot up with a frozen PE\n\nAt the time of LPAR boot up, partition firmware provides Open Firmware\nproperty ibm,dma-window for the PE. This property is provided on the PCI\nbus the PE is attached to.\n\nThere are execptions where the partition firmware might not provide this\nproperty for the PE at the time of LPAR boot up. One of the scenario is\nwhere the firmware has frozen the PE due to some error condition. This\nPE is frozen for 24 hours or unless the whole system is reinitialized.\n\nWithin this time frame, if the LPAR is booted, the frozen PE will be\npresented to the LPAR but ibm,dma-window property could be missing.\n\nToday, under these circumstances, the LPAR oopses with NULL pointer\ndereference, when configuring the PCI bus the PE is attached to.\n\n BUG: Kernel NULL pointer dereference on read at 0x000000c8\n Faulting instruction address: 0xc0000000001024c0\n Oops: Kernel access of bad area, sig: 7 [#1]\n LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries\n Modules linked in:\n Supported: Yes\n CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.4.0-150600.9-default #1\n Hardware name: IBM,9043-MRX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NM1060_023) hv:phyp pSeries\n NIP: c0000000001024c0 LR: c0000000001024b0 CTR: c000000000102450\n REGS: c0000000037db5c0 TRAP: 0300 Not tainted (6.4.0-150600.9-default)\n MSR: 8000000002009033 <SF,VEC,EE,ME,IR,DR,RI,LE> CR: 28000822 XER: 00000000\n CFAR: c00000000010254c DAR: 00000000000000c8 DSISR: 00080000 IRQMASK: 0\n ...\n NIP [c0000000001024c0] pci_dma_bus_setup_pSeriesLP+0x70/0x2a0\n LR [c0000000001024b0] pci_dma_bus_setup_pSeriesLP+0x60/0x2a0\n Call Trace:\n pci_dma_bus_setup_pSeriesLP+0x60/0x2a0 (unreliable)\n pcibios_setup_bus_self+0x1c0/0x370\n __of_scan_bus+0x2f8/0x330\n pcibios_scan_phb+0x280/0x3d0\n pcibios_init+0x88/0x12c\n do_one_initcall+0x60/0x320\n kernel_init_freeable+0x344/0x3e4\n kernel_init+0x34/0x1d0\n ret_from_kernel_user_thread+0x14/0x1c", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36926", url: "https://www.suse.com/security/cve/CVE-2024-36926", }, { category: "external", summary: "SUSE Bug 1225829 for CVE-2024-36926", url: "https://bugzilla.suse.com/1225829", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36926", }, { cve: "CVE-2024-36928", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36928", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/qeth: Fix kernel panic after setting hsuid\n\nSymptom:\nWhen the hsuid attribute is set for the first time on an IQD Layer3\ndevice while the corresponding network interface is already UP,\nthe kernel will try to execute a napi function pointer that is NULL.\n\nExample:\n---------------------------------------------------------------------------\n[ 2057.572696] illegal operation: 0001 ilc:1 [#1] SMP\n[ 2057.572702] Modules linked in: af_iucv qeth_l3 zfcp scsi_transport_fc sunrpc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6\nnft_reject nft_ct nf_tables_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink ghash_s390 prng xts aes_s390 des_s390 de\ns_generic sha3_512_s390 sha3_256_s390 sha512_s390 vfio_ccw vfio_mdev mdev vfio_iommu_type1 eadm_sch vfio ext4 mbcache jbd2 qeth_l2 bridge stp llc dasd_eckd_mod qeth dasd_mod\n qdio ccwgroup pkey zcrypt\n[ 2057.572739] CPU: 6 PID: 60182 Comm: stress_client Kdump: loaded Not tainted 4.18.0-541.el8.s390x #1\n[ 2057.572742] Hardware name: IBM 3931 A01 704 (LPAR)\n[ 2057.572744] Krnl PSW : 0704f00180000000 0000000000000002 (0x2)\n[ 2057.572748] R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:3 PM:0 RI:0 EA:3\n[ 2057.572751] Krnl GPRS: 0000000000000004 0000000000000000 00000000a3b008d8 0000000000000000\n[ 2057.572754] 00000000a3b008d8 cb923a29c779abc5 0000000000000000 00000000814cfd80\n[ 2057.572756] 000000000000012c 0000000000000000 00000000a3b008d8 00000000a3b008d8\n[ 2057.572758] 00000000bab6d500 00000000814cfd80 0000000091317e46 00000000814cfc68\n[ 2057.572762] Krnl Code:#0000000000000000: 0000 illegal\n >0000000000000002: 0000 illegal\n 0000000000000004: 0000 illegal\n 0000000000000006: 0000 illegal\n 0000000000000008: 0000 illegal\n 000000000000000a: 0000 illegal\n 000000000000000c: 0000 illegal\n 000000000000000e: 0000 illegal\n[ 2057.572800] Call Trace:\n[ 2057.572801] ([<00000000ec639700>] 0xec639700)\n[ 2057.572803] [<00000000913183e2>] net_rx_action+0x2ba/0x398\n[ 2057.572809] [<0000000091515f76>] __do_softirq+0x11e/0x3a0\n[ 2057.572813] [<0000000090ce160c>] do_softirq_own_stack+0x3c/0x58\n[ 2057.572817] ([<0000000090d2cbd6>] do_softirq.part.1+0x56/0x60)\n[ 2057.572822] [<0000000090d2cc60>] __local_bh_enable_ip+0x80/0x98\n[ 2057.572825] [<0000000091314706>] __dev_queue_xmit+0x2be/0xd70\n[ 2057.572827] [<000003ff803dd6d6>] afiucv_hs_send+0x24e/0x300 [af_iucv]\n[ 2057.572830] [<000003ff803dd88a>] iucv_send_ctrl+0x102/0x138 [af_iucv]\n[ 2057.572833] [<000003ff803de72a>] iucv_sock_connect+0x37a/0x468 [af_iucv]\n[ 2057.572835] [<00000000912e7e90>] __sys_connect+0xa0/0xd8\n[ 2057.572839] [<00000000912e9580>] sys_socketcall+0x228/0x348\n[ 2057.572841] [<0000000091514e1a>] system_call+0x2a6/0x2c8\n[ 2057.572843] Last Breaking-Event-Address:\n[ 2057.572844] [<0000000091317e44>] __napi_poll+0x4c/0x1d8\n[ 2057.572846]\n[ 2057.572847] Kernel panic - not syncing: Fatal exception in interrupt\n-------------------------------------------------------------------------------------------\n\nAnalysis:\nThere is one napi structure per out_q: card->qdio.out_qs[i].napi\nThe napi.poll functions are set during qeth_open().\n\nSince\ncommit 1cfef80d4c2b (\"s390/qeth: Don't call dev_close/dev_open (DOWN/UP)\")\nqeth_set_offline()/qeth_set_online() no longer call dev_close()/\ndev_open(). So if qeth_free_qdio_queues() cleared\ncard->qdio.out_qs[i].napi.poll while the network interface was UP and the\ncard was offline, they are not set again.\n\nReproduction:\nchzdev -e $devno layer2=0\nip link set dev $network_interface up\necho 0 > /sys/bus/ccw\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36928", url: "https://www.suse.com/security/cve/CVE-2024-36928", }, { category: "external", summary: "SUSE Bug 1225775 for CVE-2024-36928", url: "https://bugzilla.suse.com/1225775", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36928", }, { cve: "CVE-2024-36931", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36931", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/cio: Ensure the copied buf is NUL terminated\n\nCurrently, we allocate a lbuf-sized kernel buffer and copy lbuf from\nuserspace to that buffer. Later, we use scanf on this buffer but we don't\nensure that the string is terminated inside the buffer, this can lead to\nOOB read when using scanf. Fix this issue by using memdup_user_nul instead.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36931", url: "https://www.suse.com/security/cve/CVE-2024-36931", }, { category: "external", summary: "SUSE Bug 1225747 for CVE-2024-36931", url: "https://bugzilla.suse.com/1225747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36931", }, { cve: "CVE-2024-36938", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36938", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue\n\nFix NULL pointer data-races in sk_psock_skb_ingress_enqueue() which\nsyzbot reported [1].\n\n[1]\nBUG: KCSAN: data-race in sk_psock_drop / sk_psock_skb_ingress_enqueue\n\nwrite to 0xffff88814b3278b8 of 8 bytes by task 10724 on cpu 1:\n sk_psock_stop_verdict net/core/skmsg.c:1257 [inline]\n sk_psock_drop+0x13e/0x1f0 net/core/skmsg.c:843\n sk_psock_put include/linux/skmsg.h:459 [inline]\n sock_map_close+0x1a7/0x260 net/core/sock_map.c:1648\n unix_release+0x4b/0x80 net/unix/af_unix.c:1048\n __sock_release net/socket.c:659 [inline]\n sock_close+0x68/0x150 net/socket.c:1421\n __fput+0x2c1/0x660 fs/file_table.c:422\n __fput_sync+0x44/0x60 fs/file_table.c:507\n __do_sys_close fs/open.c:1556 [inline]\n __se_sys_close+0x101/0x1b0 fs/open.c:1541\n __x64_sys_close+0x1f/0x30 fs/open.c:1541\n do_syscall_64+0xd3/0x1d0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nread to 0xffff88814b3278b8 of 8 bytes by task 10713 on cpu 0:\n sk_psock_data_ready include/linux/skmsg.h:464 [inline]\n sk_psock_skb_ingress_enqueue+0x32d/0x390 net/core/skmsg.c:555\n sk_psock_skb_ingress_self+0x185/0x1e0 net/core/skmsg.c:606\n sk_psock_verdict_apply net/core/skmsg.c:1008 [inline]\n sk_psock_verdict_recv+0x3e4/0x4a0 net/core/skmsg.c:1202\n unix_read_skb net/unix/af_unix.c:2546 [inline]\n unix_stream_read_skb+0x9e/0xf0 net/unix/af_unix.c:2682\n sk_psock_verdict_data_ready+0x77/0x220 net/core/skmsg.c:1223\n unix_stream_sendmsg+0x527/0x860 net/unix/af_unix.c:2339\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x140/0x180 net/socket.c:745\n ____sys_sendmsg+0x312/0x410 net/socket.c:2584\n ___sys_sendmsg net/socket.c:2638 [inline]\n __sys_sendmsg+0x1e9/0x280 net/socket.c:2667\n __do_sys_sendmsg net/socket.c:2676 [inline]\n __se_sys_sendmsg net/socket.c:2674 [inline]\n __x64_sys_sendmsg+0x46/0x50 net/socket.c:2674\n do_syscall_64+0xd3/0x1d0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nvalue changed: 0xffffffff83d7feb0 -> 0x0000000000000000\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 0 PID: 10713 Comm: syz-executor.4 Tainted: G W 6.8.0-syzkaller-08951-gfe46a7dd189e #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024\n\nPrior to this, commit 4cd12c6065df (\"bpf, sockmap: Fix NULL pointer\ndereference in sk_psock_verdict_data_ready()\") fixed one NULL pointer\nsimilarly due to no protection of saved_data_ready. Here is another\ndifferent caller causing the same issue because of the same reason. So\nwe should protect it with sk_callback_lock read lock because the writer\nside in the sk_psock_drop() uses \"write_lock_bh(&sk->sk_callback_lock);\".\n\nTo avoid errors that could happen in future, I move those two pairs of\nlock into the sk_psock_data_ready(), which is suggested by John Fastabend.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36938", url: "https://www.suse.com/security/cve/CVE-2024-36938", }, { category: "external", summary: "SUSE Bug 1225761 for CVE-2024-36938", url: "https://bugzilla.suse.com/1225761", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36938", }, { cve: "CVE-2024-36940", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36940", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: core: delete incorrect free in pinctrl_enable()\n\nThe \"pctldev\" struct is allocated in devm_pinctrl_register_and_init().\nIt's a devm_ managed pointer that is freed by devm_pinctrl_dev_release(),\nso freeing it in pinctrl_enable() will lead to a double free.\n\nThe devm_pinctrl_dev_release() function frees the pindescs and destroys\nthe mutex as well.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36940", url: "https://www.suse.com/security/cve/CVE-2024-36940", }, { category: "external", summary: "SUSE Bug 1225840 for CVE-2024-36940", url: "https://bugzilla.suse.com/1225840", }, { category: "external", summary: "SUSE Bug 1225841 for CVE-2024-36940", url: "https://bugzilla.suse.com/1225841", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "important", }, ], title: "CVE-2024-36940", }, { cve: "CVE-2024-36941", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36941", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: nl80211: don't free NULL coalescing rule\n\nIf the parsing fails, we can dereference a NULL pointer here.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36941", url: "https://www.suse.com/security/cve/CVE-2024-36941", }, { category: "external", summary: "SUSE Bug 1225835 for CVE-2024-36941", url: "https://bugzilla.suse.com/1225835", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36941", }, { cve: "CVE-2024-36942", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36942", }, ], notes: [ { category: "general", text: "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36942", url: "https://www.suse.com/security/cve/CVE-2024-36942", }, { category: "external", summary: "SUSE Bug 1225843 for CVE-2024-36942", url: "https://bugzilla.suse.com/1225843", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36942", }, { cve: "CVE-2024-36944", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36944", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nReapply \"drm/qxl: simplify qxl_fence_wait\"\n\nThis reverts commit 07ed11afb68d94eadd4ffc082b97c2331307c5ea.\n\nStephen Rostedt reports:\n \"I went to run my tests on my VMs and the tests hung on boot up.\n Unfortunately, the most I ever got out was:\n\n [ 93.607888] Testing event system initcall: OK\n [ 93.667730] Running tests on all trace events:\n [ 93.669757] Testing all events: OK\n [ 95.631064] ------------[ cut here ]------------\n Timed out after 60 seconds\"\n\nand further debugging points to a possible circular locking dependency\nbetween the console_owner locking and the worker pool locking.\n\nReverting the commit allows Steve's VM to boot to completion again.\n\n[ This may obviously result in the \"[TTM] Buffer eviction failed\"\n messages again, which was the reason for that original revert. But at\n this point this seems preferable to a non-booting system... ]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36944", url: "https://www.suse.com/security/cve/CVE-2024-36944", }, { category: "external", summary: "SUSE Bug 1225847 for CVE-2024-36944", url: "https://bugzilla.suse.com/1225847", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36944", }, { cve: "CVE-2024-36947", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36947", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nqibfs: fix dentry leak\n\nsimple_recursive_removal() drops the pinning references to all positives\nin subtree. For the cases when its argument has been kept alive by\nthe pinning alone that's exactly the right thing to do, but here\nthe argument comes from dcache lookup, that needs to be balanced by\nexplicit dput().\n\nFucked-up-by: Al Viro <viro@zeniv.linux.org.uk>", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36947", url: "https://www.suse.com/security/cve/CVE-2024-36947", }, { category: "external", summary: "SUSE Bug 1225856 for CVE-2024-36947", url: "https://bugzilla.suse.com/1225856", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-36947", }, { cve: "CVE-2024-36950", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36950", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nfirewire: ohci: mask bus reset interrupts between ISR and bottom half\n\nIn the FireWire OHCI interrupt handler, if a bus reset interrupt has\noccurred, mask bus reset interrupts until bus_reset_work has serviced and\ncleared the interrupt.\n\nNormally, we always leave bus reset interrupts masked. We infer the bus\nreset from the self-ID interrupt that happens shortly thereafter. A\nscenario where we unmask bus reset interrupts was introduced in 2008 in\na007bb857e0b26f5d8b73c2ff90782d9c0972620: If\nOHCI_PARAM_DEBUG_BUSRESETS (8) is set in the debug parameter bitmask, we\nwill unmask bus reset interrupts so we can log them.\n\nirq_handler logs the bus reset interrupt. However, we can't clear the bus\nreset event flag in irq_handler, because we won't service the event until\nlater. irq_handler exits with the event flag still set. If the\ncorresponding interrupt is still unmasked, the first bus reset will\nusually freeze the system due to irq_handler being called again each\ntime it exits. This freeze can be reproduced by loading firewire_ohci\nwith \"modprobe firewire_ohci debug=-1\" (to enable all debugging output).\nApparently there are also some cases where bus_reset_work will get called\nsoon enough to clear the event, and operation will continue normally.\n\nThis freeze was first reported a few months after a007bb85 was committed,\nbut until now it was never fixed. The debug level could safely be set\nto -1 through sysfs after the module was loaded, but this would be\nineffectual in logging bus reset interrupts since they were only\nunmasked during initialization.\n\nirq_handler will now leave the event flag set but mask bus reset\ninterrupts, so irq_handler won't be called again and there will be no\nfreeze. If OHCI_PARAM_DEBUG_BUSRESETS is enabled, bus_reset_work will\nunmask the interrupt after servicing the event, so future interrupts\nwill be caught as desired.\n\nAs a side effect to this change, OHCI_PARAM_DEBUG_BUSRESETS can now be\nenabled through sysfs in addition to during initial module loading.\nHowever, when enabled through sysfs, logging of bus reset interrupts will\nbe effective only starting with the second bus reset, after\nbus_reset_work has executed.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36950", url: "https://www.suse.com/security/cve/CVE-2024-36950", }, { category: "external", summary: "SUSE Bug 1225895 for CVE-2024-36950", url: "https://bugzilla.suse.com/1225895", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36950", }, { cve: "CVE-2024-36952", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36952", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Move NPIV's transport unregistration to after resource clean up\n\nThere are cases after NPIV deletion where the fabric switch still believes\nthe NPIV is logged into the fabric. This occurs when a vport is\nunregistered before the Remove All DA_ID CT and LOGO ELS are sent to the\nfabric.\n\nCurrently fc_remove_host(), which calls dev_loss_tmo for all D_IDs including\nthe fabric D_ID, removes the last ndlp reference and frees the ndlp rport\nobject. This sometimes causes the race condition where the final DA_ID and\nLOGO are skipped from being sent to the fabric switch.\n\nFix by moving the fc_remove_host() and scsi_remove_host() calls after DA_ID\nand LOGO are sent.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36952", url: "https://www.suse.com/security/cve/CVE-2024-36952", }, { category: "external", summary: "SUSE Bug 1225898 for CVE-2024-36952", url: "https://bugzilla.suse.com/1225898", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36952", }, { cve: "CVE-2024-36955", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36955", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node()\n\nThe documentation for device_get_named_child_node() mentions this\nimportant point:\n\n\"\nThe caller is responsible for calling fwnode_handle_put() on the\nreturned fwnode pointer.\n\"\n\nAdd fwnode_handle_put() to avoid a leaked reference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36955", url: "https://www.suse.com/security/cve/CVE-2024-36955", }, { category: "external", summary: "SUSE Bug 1225810 for CVE-2024-36955", url: "https://bugzilla.suse.com/1225810", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "low", }, ], title: "CVE-2024-36955", }, { cve: "CVE-2024-36959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36959", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map()\n\nIf we fail to allocate propname buffer, we need to drop the reference\ncount we just took. Because the pinctrl_dt_free_maps() includes the\ndroping operation, here we call it directly.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36959", url: "https://www.suse.com/security/cve/CVE-2024-36959", }, { category: "external", summary: "SUSE Bug 1225839 for CVE-2024-36959", url: "https://bugzilla.suse.com/1225839", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.58.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.58.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-12T11:33:43Z", details: "moderate", }, ], title: "CVE-2024-36959", }, ], }
suse-su-2025:0231-1
Vulnerability from csaf_suse
Published
2025-01-24 10:10
Modified
2025-01-24 10:10
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642).
- CVE-2024-53146: NFSD: Prevent a potential integer overflow (bsc#1234853).
- CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (bsc#1234846).
- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234891).
- CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921).
- CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004).
- CVE-2024-53239: ALSA: 6fire: Release resources at card release (bsc#1235054).
- CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281).
- CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall page (XSA-466 bsc#1234282).
- CVE-2024-56539: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (bsc#1234963).
- CVE-2024-56548: hfsplus: do not query the device logical block size multiple times (bsc#1235073).
- CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function (bsc#1235035).
- CVE-2024-56598: jfs: array-index-out-of-bounds fix in dtReadFirst (bsc#1235220).
- CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056).
- CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235061).
- CVE-2024-56619: nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (bsc#1235224).
- CVE-2024-8805: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (bsc#1230697).
The following non-security bugs were fixed:
- KVM: x86: fix sending PV IPI (git-fixes).
- idpf: add support for SW triggered interrupts (bsc#1235507).
- idpf: enable WB_ON_ITR (bsc#1235507).
- idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507).
- kernel-binary: do not BuildIgnore m4. It is actually needed for regenerating zconf when it is not up-to-date due to merge.
- kernel/fork: beware of __put_task_struct() calling context (bsc#1189998 (PREEMPT_RT prerequisite backports)).
- net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246).
- rpm/kernel-binary.spec.in: Fix build regression The previous fix forgot to take over grep -c option that broke the conditional expression
- scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error (git-fixes).
- smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: this fixes issue discussed in bsc#1233642].
- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).
- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).
- x86/bug: Merge annotate_reachable() into _BUG_FLAGS() asm (git-fixes).
- x86/fpu/xsave: Handle compacted offsets correctly with supervisor states (git-fixes).
- x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes).
- x86/fpu: Remove unused supervisor only offsets (git-fixes).
- x86/kvm: Do not use pv tlb/ipi/sched_yield if on 1 vCPU (git-fixes).
- x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).
- x86/mce: Allow instrumentation during task work queueing (git-fixes).
- x86/mce: Mark mce_end() noinstr (git-fixes).
- x86/mce: Mark mce_panic() noinstr (git-fixes).
- x86/mce: Mark mce_read_aux() noinstr (git-fixes).
- x86/mm: Flush global TLB when switching to trampoline page-table (git-fixes).
- x86/sgx: Free backing memory after faulting the enclave page (git-fixes).
- x86/sgx: Silence softlockup detection when releasing large enclaves (git-fixes).
- x86/uaccess: Move variable into switch case statement (git-fixes).
- x86: Annotate call_on_stack() (git-fixes).
Patchnames
SUSE-2025-231,SUSE-SLE-Micro-5.3-2025-231,SUSE-SLE-Micro-5.4-2025-231
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642).\n- CVE-2024-53146: NFSD: Prevent a potential integer overflow (bsc#1234853).\n- CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (bsc#1234846).\n- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234891).\n- CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921).\n- CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004).\n- CVE-2024-53239: ALSA: 6fire: Release resources at card release (bsc#1235054).\n- CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281).\n- CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall page (XSA-466 bsc#1234282).\n- CVE-2024-56539: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (bsc#1234963).\n- CVE-2024-56548: hfsplus: do not query the device logical block size multiple times (bsc#1235073).\n- CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function (bsc#1235035).\n- CVE-2024-56598: jfs: array-index-out-of-bounds fix in dtReadFirst (bsc#1235220).\n- CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056).\n- CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235061).\n- CVE-2024-56619: nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (bsc#1235224).\n- CVE-2024-8805: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (bsc#1230697).\n\nThe following non-security bugs were fixed:\n\n- KVM: x86: fix sending PV IPI (git-fixes).\n- idpf: add support for SW triggered interrupts (bsc#1235507).\n- idpf: enable WB_ON_ITR (bsc#1235507).\n- idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507).\n- kernel-binary: do not BuildIgnore m4. It is actually needed for regenerating zconf when it is not up-to-date due to merge.\n- kernel/fork: beware of __put_task_struct() calling context (bsc#1189998 (PREEMPT_RT prerequisite backports)).\n- net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246).\n- rpm/kernel-binary.spec.in: Fix build regression The previous fix forgot to take over grep -c option that broke the conditional expression\n- scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error (git-fixes).\n- smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: this fixes issue discussed in bsc#1233642].\n- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).\n- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).\n- x86/bug: Merge annotate_reachable() into _BUG_FLAGS() asm (git-fixes).\n- x86/fpu/xsave: Handle compacted offsets correctly with supervisor states (git-fixes).\n- x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes).\n- x86/fpu: Remove unused supervisor only offsets (git-fixes).\n- x86/kvm: Do not use pv tlb/ipi/sched_yield if on 1 vCPU (git-fixes).\n- x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).\n- x86/mce: Allow instrumentation during task work queueing (git-fixes).\n- x86/mce: Mark mce_end() noinstr (git-fixes).\n- x86/mce: Mark mce_panic() noinstr (git-fixes).\n- x86/mce: Mark mce_read_aux() noinstr (git-fixes).\n- x86/mm: Flush global TLB when switching to trampoline page-table (git-fixes).\n- x86/sgx: Free backing memory after faulting the enclave page (git-fixes).\n- x86/sgx: Silence softlockup detection when releasing large enclaves (git-fixes).\n- x86/uaccess: Move variable into switch case statement (git-fixes).\n- x86: Annotate call_on_stack() (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2025-231,SUSE-SLE-Micro-5.3-2025-231,SUSE-SLE-Micro-5.4-2025-231", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0231-1.json", }, { category: "self", summary: "URL for SUSE-SU-2025:0231-1", url: "https://www.suse.com/support/update/announcement/2025/suse-su-20250231-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2025:0231-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html", }, { category: "self", summary: "SUSE Bug 1170891", url: "https://bugzilla.suse.com/1170891", }, { category: "self", summary: "SUSE Bug 1173139", url: "https://bugzilla.suse.com/1173139", }, { category: "self", summary: "SUSE Bug 1185010", url: "https://bugzilla.suse.com/1185010", }, { category: "self", summary: "SUSE Bug 1189998", url: "https://bugzilla.suse.com/1189998", }, { category: "self", summary: "SUSE Bug 1190358", url: "https://bugzilla.suse.com/1190358", }, { category: "self", summary: "SUSE Bug 1190428", url: "https://bugzilla.suse.com/1190428", }, { category: "self", summary: "SUSE Bug 1191949", url: "https://bugzilla.suse.com/1191949", }, { category: "self", summary: "SUSE Bug 1193983", url: "https://bugzilla.suse.com/1193983", }, { category: "self", summary: "SUSE Bug 1196869", url: "https://bugzilla.suse.com/1196869", }, { category: "self", summary: "SUSE Bug 1200313", url: "https://bugzilla.suse.com/1200313", }, { category: "self", summary: "SUSE Bug 1201308", url: "https://bugzilla.suse.com/1201308", }, { category: "self", summary: "SUSE Bug 1201489", url: "https://bugzilla.suse.com/1201489", }, { category: "self", summary: "SUSE Bug 1209657", url: "https://bugzilla.suse.com/1209657", }, { category: "self", summary: "SUSE Bug 1209798", url: "https://bugzilla.suse.com/1209798", }, { category: "self", summary: "SUSE Bug 1211592", url: "https://bugzilla.suse.com/1211592", }, { category: "self", summary: "SUSE Bug 1215304", url: "https://bugzilla.suse.com/1215304", }, { category: "self", summary: "SUSE Bug 1216702", url: "https://bugzilla.suse.com/1216702", }, { category: "self", summary: "SUSE Bug 1217169", url: "https://bugzilla.suse.com/1217169", }, { category: "self", summary: "SUSE Bug 1218447", url: "https://bugzilla.suse.com/1218447", }, { category: "self", summary: "SUSE Bug 1221044", url: "https://bugzilla.suse.com/1221044", }, { category: "self", summary: "SUSE Bug 1222721", url: "https://bugzilla.suse.com/1222721", }, { category: "self", summary: "SUSE Bug 1222878", url: "https://bugzilla.suse.com/1222878", }, { category: "self", summary: "SUSE Bug 1223481", url: "https://bugzilla.suse.com/1223481", }, { category: "self", summary: "SUSE Bug 1223501", url: "https://bugzilla.suse.com/1223501", }, { category: "self", summary: "SUSE Bug 1223512", url: "https://bugzilla.suse.com/1223512", }, { category: "self", summary: "SUSE Bug 1223520", url: "https://bugzilla.suse.com/1223520", }, { category: "self", summary: "SUSE Bug 1223894", url: "https://bugzilla.suse.com/1223894", }, { category: "self", summary: "SUSE Bug 1223921", url: "https://bugzilla.suse.com/1223921", }, { category: "self", summary: "SUSE Bug 1223922", url: "https://bugzilla.suse.com/1223922", }, { category: "self", summary: "SUSE Bug 1223923", url: "https://bugzilla.suse.com/1223923", }, { category: "self", summary: "SUSE Bug 1223924", url: "https://bugzilla.suse.com/1223924", }, { category: "self", summary: "SUSE Bug 1223929", url: "https://bugzilla.suse.com/1223929", }, { category: "self", summary: "SUSE Bug 1223931", url: "https://bugzilla.suse.com/1223931", }, { category: "self", summary: "SUSE Bug 1223932", url: "https://bugzilla.suse.com/1223932", }, { category: "self", summary: "SUSE Bug 1223934", url: "https://bugzilla.suse.com/1223934", }, { category: "self", summary: "SUSE Bug 1223941", url: "https://bugzilla.suse.com/1223941", }, { category: "self", summary: "SUSE Bug 1223948", url: "https://bugzilla.suse.com/1223948", }, { category: "self", summary: "SUSE Bug 1223952", url: "https://bugzilla.suse.com/1223952", }, { category: "self", summary: "SUSE Bug 1223953", url: "https://bugzilla.suse.com/1223953", }, { category: "self", summary: "SUSE Bug 1223957", url: "https://bugzilla.suse.com/1223957", }, { category: "self", summary: "SUSE Bug 1223962", url: "https://bugzilla.suse.com/1223962", }, { category: "self", summary: "SUSE Bug 1223963", url: "https://bugzilla.suse.com/1223963", }, { category: "self", summary: "SUSE Bug 1223964", url: "https://bugzilla.suse.com/1223964", }, { category: "self", summary: "SUSE Bug 1223996", url: "https://bugzilla.suse.com/1223996", }, { category: "self", summary: "SUSE Bug 1224099", url: "https://bugzilla.suse.com/1224099", }, { category: "self", summary: "SUSE Bug 1224482", url: "https://bugzilla.suse.com/1224482", }, { category: "self", summary: "SUSE Bug 1224511", url: "https://bugzilla.suse.com/1224511", }, { category: "self", summary: "SUSE Bug 1224592", url: "https://bugzilla.suse.com/1224592", }, { category: "self", summary: "SUSE Bug 1224685", url: "https://bugzilla.suse.com/1224685", }, { category: "self", summary: "SUSE Bug 1224730", url: "https://bugzilla.suse.com/1224730", }, { category: "self", summary: "SUSE Bug 1224816", url: "https://bugzilla.suse.com/1224816", }, { category: "self", summary: "SUSE Bug 1224895", url: "https://bugzilla.suse.com/1224895", }, { category: "self", summary: "SUSE Bug 1224898", url: "https://bugzilla.suse.com/1224898", }, { category: "self", summary: "SUSE Bug 1224900", url: "https://bugzilla.suse.com/1224900", }, { category: "self", summary: "SUSE Bug 1224901", url: "https://bugzilla.suse.com/1224901", }, { category: "self", summary: "SUSE Bug 1230697", url: "https://bugzilla.suse.com/1230697", }, { category: "self", summary: "SUSE Bug 1232436", url: "https://bugzilla.suse.com/1232436", }, { category: "self", summary: "SUSE Bug 1233070", url: "https://bugzilla.suse.com/1233070", }, { category: "self", summary: "SUSE Bug 1233642", url: "https://bugzilla.suse.com/1233642", }, { category: "self", summary: "SUSE Bug 1234281", url: "https://bugzilla.suse.com/1234281", }, { category: "self", summary: "SUSE Bug 1234282", url: "https://bugzilla.suse.com/1234282", }, { category: "self", summary: "SUSE Bug 1234846", url: "https://bugzilla.suse.com/1234846", }, { category: "self", summary: "SUSE Bug 1234853", url: "https://bugzilla.suse.com/1234853", }, { category: "self", summary: "SUSE Bug 1234891", url: "https://bugzilla.suse.com/1234891", }, { category: "self", summary: "SUSE Bug 1234921", url: "https://bugzilla.suse.com/1234921", }, { category: "self", summary: "SUSE Bug 1234960", url: "https://bugzilla.suse.com/1234960", }, { category: "self", summary: "SUSE Bug 1234963", url: "https://bugzilla.suse.com/1234963", }, { category: "self", summary: "SUSE Bug 1235004", url: "https://bugzilla.suse.com/1235004", }, { category: "self", summary: "SUSE Bug 1235035", url: "https://bugzilla.suse.com/1235035", }, { category: "self", summary: "SUSE Bug 1235054", url: "https://bugzilla.suse.com/1235054", }, { category: "self", summary: "SUSE Bug 1235056", url: "https://bugzilla.suse.com/1235056", }, { category: "self", summary: "SUSE Bug 1235061", url: "https://bugzilla.suse.com/1235061", }, { category: "self", summary: "SUSE Bug 1235073", url: "https://bugzilla.suse.com/1235073", }, { category: "self", summary: "SUSE Bug 1235220", url: "https://bugzilla.suse.com/1235220", }, { category: "self", summary: "SUSE Bug 1235224", url: "https://bugzilla.suse.com/1235224", }, { category: "self", summary: "SUSE Bug 1235246", url: "https://bugzilla.suse.com/1235246", }, { category: "self", summary: "SUSE Bug 1235507", url: "https://bugzilla.suse.com/1235507", }, { category: "self", summary: "SUSE CVE CVE-2020-36788 page", url: "https://www.suse.com/security/cve/CVE-2020-36788/", }, { category: "self", summary: "SUSE CVE CVE-2021-4148 page", url: "https://www.suse.com/security/cve/CVE-2021-4148/", }, { category: "self", summary: "SUSE CVE CVE-2021-42327 page", url: "https://www.suse.com/security/cve/CVE-2021-42327/", }, { category: "self", summary: "SUSE CVE CVE-2021-47202 page", url: "https://www.suse.com/security/cve/CVE-2021-47202/", }, { category: "self", summary: "SUSE CVE CVE-2021-47365 page", url: "https://www.suse.com/security/cve/CVE-2021-47365/", }, { category: "self", summary: "SUSE CVE CVE-2021-47489 page", url: "https://www.suse.com/security/cve/CVE-2021-47489/", }, { category: "self", summary: "SUSE CVE CVE-2021-47491 page", url: "https://www.suse.com/security/cve/CVE-2021-47491/", }, { category: "self", summary: "SUSE CVE CVE-2021-47492 page", url: "https://www.suse.com/security/cve/CVE-2021-47492/", }, { category: "self", summary: "SUSE CVE CVE-2022-48632 page", url: "https://www.suse.com/security/cve/CVE-2022-48632/", }, { category: "self", summary: "SUSE CVE CVE-2022-48634 page", url: "https://www.suse.com/security/cve/CVE-2022-48634/", }, { category: "self", summary: "SUSE CVE CVE-2022-48636 page", url: "https://www.suse.com/security/cve/CVE-2022-48636/", }, { category: "self", summary: "SUSE CVE CVE-2022-48652 page", url: "https://www.suse.com/security/cve/CVE-2022-48652/", }, { category: "self", summary: "SUSE CVE CVE-2022-48671 page", url: "https://www.suse.com/security/cve/CVE-2022-48671/", }, { category: "self", summary: "SUSE CVE CVE-2022-48672 page", url: "https://www.suse.com/security/cve/CVE-2022-48672/", }, { category: "self", summary: "SUSE CVE CVE-2022-48673 page", url: "https://www.suse.com/security/cve/CVE-2022-48673/", }, { category: "self", summary: "SUSE CVE CVE-2022-48675 page", url: "https://www.suse.com/security/cve/CVE-2022-48675/", }, { category: "self", summary: "SUSE CVE CVE-2022-48686 page", url: "https://www.suse.com/security/cve/CVE-2022-48686/", }, { category: "self", summary: "SUSE CVE CVE-2022-48687 page", url: "https://www.suse.com/security/cve/CVE-2022-48687/", }, { category: "self", summary: "SUSE CVE CVE-2022-48688 page", url: "https://www.suse.com/security/cve/CVE-2022-48688/", }, { category: "self", summary: "SUSE CVE CVE-2022-48692 page", url: "https://www.suse.com/security/cve/CVE-2022-48692/", }, { category: "self", summary: "SUSE CVE CVE-2022-48693 page", url: "https://www.suse.com/security/cve/CVE-2022-48693/", }, { category: "self", summary: "SUSE CVE CVE-2022-48694 page", url: "https://www.suse.com/security/cve/CVE-2022-48694/", }, { category: "self", summary: "SUSE CVE CVE-2022-48695 page", url: "https://www.suse.com/security/cve/CVE-2022-48695/", }, { category: "self", summary: "SUSE CVE CVE-2022-48697 page", url: "https://www.suse.com/security/cve/CVE-2022-48697/", }, { category: "self", summary: "SUSE CVE CVE-2022-48699 page", url: "https://www.suse.com/security/cve/CVE-2022-48699/", }, { category: "self", summary: "SUSE CVE CVE-2022-48700 page", url: "https://www.suse.com/security/cve/CVE-2022-48700/", }, { category: "self", summary: "SUSE CVE CVE-2022-48701 page", url: "https://www.suse.com/security/cve/CVE-2022-48701/", }, { category: "self", summary: "SUSE CVE CVE-2022-48702 page", url: "https://www.suse.com/security/cve/CVE-2022-48702/", }, { category: "self", summary: "SUSE CVE CVE-2022-48703 page", url: "https://www.suse.com/security/cve/CVE-2022-48703/", }, { category: "self", summary: "SUSE CVE CVE-2022-48704 page", url: "https://www.suse.com/security/cve/CVE-2022-48704/", }, { category: "self", summary: "SUSE CVE CVE-2022-49035 page", url: "https://www.suse.com/security/cve/CVE-2022-49035/", }, { category: "self", summary: "SUSE CVE CVE-2023-0160 page", url: "https://www.suse.com/security/cve/CVE-2023-0160/", }, { category: "self", summary: "SUSE CVE CVE-2023-2860 page", url: "https://www.suse.com/security/cve/CVE-2023-2860/", }, { category: "self", summary: "SUSE CVE CVE-2023-47233 page", url: "https://www.suse.com/security/cve/CVE-2023-47233/", }, { category: "self", summary: "SUSE CVE CVE-2023-52591 page", url: "https://www.suse.com/security/cve/CVE-2023-52591/", }, { category: "self", summary: "SUSE CVE CVE-2023-52654 page", url: "https://www.suse.com/security/cve/CVE-2023-52654/", }, { category: "self", summary: "SUSE CVE CVE-2023-52655 page", url: "https://www.suse.com/security/cve/CVE-2023-52655/", }, { category: "self", summary: "SUSE CVE CVE-2023-52676 page", url: "https://www.suse.com/security/cve/CVE-2023-52676/", }, { category: "self", summary: "SUSE CVE CVE-2023-6531 page", url: "https://www.suse.com/security/cve/CVE-2023-6531/", }, { category: "self", summary: "SUSE CVE CVE-2024-26764 page", url: "https://www.suse.com/security/cve/CVE-2024-26764/", }, { category: "self", summary: "SUSE CVE CVE-2024-35811 page", url: "https://www.suse.com/security/cve/CVE-2024-35811/", }, { category: "self", summary: "SUSE CVE CVE-2024-35815 page", url: "https://www.suse.com/security/cve/CVE-2024-35815/", }, { category: "self", summary: "SUSE CVE CVE-2024-35895 page", url: "https://www.suse.com/security/cve/CVE-2024-35895/", }, { category: "self", summary: "SUSE CVE CVE-2024-35914 page", url: "https://www.suse.com/security/cve/CVE-2024-35914/", }, { category: "self", summary: "SUSE CVE CVE-2024-50154 page", url: "https://www.suse.com/security/cve/CVE-2024-50154/", }, { category: "self", summary: "SUSE CVE CVE-2024-53095 page", url: "https://www.suse.com/security/cve/CVE-2024-53095/", }, { category: "self", summary: "SUSE CVE CVE-2024-53142 page", url: "https://www.suse.com/security/cve/CVE-2024-53142/", }, { category: "self", summary: "SUSE CVE CVE-2024-53146 page", url: "https://www.suse.com/security/cve/CVE-2024-53146/", }, { category: "self", summary: "SUSE CVE CVE-2024-53156 page", url: "https://www.suse.com/security/cve/CVE-2024-53156/", }, { category: "self", summary: "SUSE CVE CVE-2024-53173 page", url: "https://www.suse.com/security/cve/CVE-2024-53173/", }, { category: "self", summary: "SUSE CVE CVE-2024-53179 page", url: "https://www.suse.com/security/cve/CVE-2024-53179/", }, { category: "self", summary: "SUSE CVE CVE-2024-53206 page", url: "https://www.suse.com/security/cve/CVE-2024-53206/", }, { category: "self", summary: "SUSE CVE CVE-2024-53214 page", url: "https://www.suse.com/security/cve/CVE-2024-53214/", }, { category: "self", summary: "SUSE CVE CVE-2024-53239 page", url: "https://www.suse.com/security/cve/CVE-2024-53239/", }, { category: "self", summary: "SUSE CVE CVE-2024-53240 page", url: "https://www.suse.com/security/cve/CVE-2024-53240/", }, { category: "self", summary: "SUSE CVE CVE-2024-53241 page", url: "https://www.suse.com/security/cve/CVE-2024-53241/", }, { category: "self", summary: "SUSE CVE CVE-2024-56539 page", url: "https://www.suse.com/security/cve/CVE-2024-56539/", }, { category: "self", summary: "SUSE CVE CVE-2024-56548 page", url: "https://www.suse.com/security/cve/CVE-2024-56548/", }, { category: "self", summary: "SUSE CVE CVE-2024-56570 page", url: "https://www.suse.com/security/cve/CVE-2024-56570/", }, { category: "self", summary: "SUSE CVE CVE-2024-56598 page", url: "https://www.suse.com/security/cve/CVE-2024-56598/", }, { category: "self", summary: "SUSE CVE CVE-2024-56604 page", url: "https://www.suse.com/security/cve/CVE-2024-56604/", }, { category: "self", summary: "SUSE CVE CVE-2024-56605 page", url: "https://www.suse.com/security/cve/CVE-2024-56605/", }, { category: "self", summary: "SUSE CVE CVE-2024-56619 page", url: "https://www.suse.com/security/cve/CVE-2024-56619/", }, { category: "self", summary: "SUSE CVE CVE-2024-8805 page", url: "https://www.suse.com/security/cve/CVE-2024-8805/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2025-01-24T10:10:55Z", generator: { date: "2025-01-24T10:10:55Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2025:0231-1", initial_release_date: "2025-01-24T10:10:55Z", revision_history: [ { date: "2025-01-24T10:10:55Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-5.14.21-150400.15.106.1.noarch", product: { name: "kernel-devel-rt-5.14.21-150400.15.106.1.noarch", product_id: "kernel-devel-rt-5.14.21-150400.15.106.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-5.14.21-150400.15.106.1.noarch", product: { name: "kernel-source-rt-5.14.21-150400.15.106.1.noarch", product_id: "kernel-source-rt-5.14.21-150400.15.106.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-5.14.21-150400.15.106.1.x86_64", product: { name: "cluster-md-kmp-rt-5.14.21-150400.15.106.1.x86_64", product_id: "cluster-md-kmp-rt-5.14.21-150400.15.106.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-5.14.21-150400.15.106.1.x86_64", product: { name: "dlm-kmp-rt-5.14.21-150400.15.106.1.x86_64", product_id: "dlm-kmp-rt-5.14.21-150400.15.106.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-5.14.21-150400.15.106.1.x86_64", product: { name: "gfs2-kmp-rt-5.14.21-150400.15.106.1.x86_64", product_id: "gfs2-kmp-rt-5.14.21-150400.15.106.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-5.14.21-150400.15.106.1.x86_64", product: { name: "kernel-rt-5.14.21-150400.15.106.1.x86_64", product_id: "kernel-rt-5.14.21-150400.15.106.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-5.14.21-150400.15.106.1.x86_64", product: { name: "kernel-rt-devel-5.14.21-150400.15.106.1.x86_64", product_id: "kernel-rt-devel-5.14.21-150400.15.106.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-5.14.21-150400.15.106.1.x86_64", product: { name: "kernel-rt-extra-5.14.21-150400.15.106.1.x86_64", product_id: "kernel-rt-extra-5.14.21-150400.15.106.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-5.14.21-150400.15.106.1.x86_64", product: { name: "kernel-rt-livepatch-5.14.21-150400.15.106.1.x86_64", product_id: "kernel-rt-livepatch-5.14.21-150400.15.106.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-devel-5.14.21-150400.15.106.1.x86_64", product: { name: "kernel-rt-livepatch-devel-5.14.21-150400.15.106.1.x86_64", product_id: "kernel-rt-livepatch-devel-5.14.21-150400.15.106.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-optional-5.14.21-150400.15.106.1.x86_64", product: { name: "kernel-rt-optional-5.14.21-150400.15.106.1.x86_64", product_id: "kernel-rt-optional-5.14.21-150400.15.106.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-5.14.21-150400.15.106.1.x86_64", product: { name: "kernel-rt_debug-5.14.21-150400.15.106.1.x86_64", product_id: "kernel-rt_debug-5.14.21-150400.15.106.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-5.14.21-150400.15.106.1.x86_64", product: { name: "kernel-rt_debug-devel-5.14.21-150400.15.106.1.x86_64", product_id: "kernel-rt_debug-devel-5.14.21-150400.15.106.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-5.14.21-150400.15.106.1.x86_64", product: { name: "kernel-syms-rt-5.14.21-150400.15.106.1.x86_64", product_id: "kernel-syms-rt-5.14.21-150400.15.106.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-5.14.21-150400.15.106.1.x86_64", product: { name: "kselftests-kmp-rt-5.14.21-150400.15.106.1.x86_64", product_id: "kselftests-kmp-rt-5.14.21-150400.15.106.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-5.14.21-150400.15.106.1.x86_64", product: { name: "ocfs2-kmp-rt-5.14.21-150400.15.106.1.x86_64", product_id: "ocfs2-kmp-rt-5.14.21-150400.15.106.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt-5.14.21-150400.15.106.1.x86_64", product: { name: "reiserfs-kmp-rt-5.14.21-150400.15.106.1.x86_64", product_id: "reiserfs-kmp-rt-5.14.21-150400.15.106.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Micro 5.3", product: { name: "SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3", product_identification_helper: { cpe: "cpe:/o:suse:sle-micro:5.3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.4", product: { name: "SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4", product_identification_helper: { cpe: "cpe:/o:suse:sle-micro:5.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.106.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.106.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.14.21-150400.15.106.1.noarch as component of SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", }, product_reference: "kernel-source-rt-5.14.21-150400.15.106.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.106.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.106.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.14.21-150400.15.106.1.noarch as component of SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", }, product_reference: "kernel-source-rt-5.14.21-150400.15.106.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.4", }, ], }, vulnerabilities: [ { cve: "CVE-2020-36788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-36788", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau: avoid a use-after-free when BO init fails\n\nnouveau_bo_init() is backed by ttm_bo_init() and ferries its return code\nback to the caller. On failures, ttm_bo_init() invokes the provided\ndestructor which should de-initialize and free the memory.\n\nThus, when nouveau_bo_init() returns an error the gem object has already\nbeen released and the memory freed by nouveau_bo_del_ttm().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-36788", url: "https://www.suse.com/security/cve/CVE-2020-36788", }, { category: "external", summary: "SUSE Bug 1224816 for CVE-2020-36788", url: "https://bugzilla.suse.com/1224816", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2020-36788", }, { cve: "CVE-2021-4148", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4148", }, ], notes: [ { category: "general", text: "A vulnerability was found in the Linux kernel's block_invalidatepage in fs/buffer.c in the filesystem. A missing sanity check may allow a local attacker with user privilege to cause a denial of service (DOS) problem.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-4148", url: "https://www.suse.com/security/cve/CVE-2021-4148", }, { category: "external", summary: "SUSE Bug 1193983 for CVE-2021-4148", url: "https://bugzilla.suse.com/1193983", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2021-4148", }, { cve: "CVE-2021-42327", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42327", }, ], notes: [ { category: "general", text: "dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-42327", url: "https://www.suse.com/security/cve/CVE-2021-42327", }, { category: "external", summary: "SUSE Bug 1191949 for CVE-2021-42327", url: "https://bugzilla.suse.com/1191949", }, { category: "external", summary: "SUSE Bug 1224901 for CVE-2021-42327", url: "https://bugzilla.suse.com/1224901", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "important", }, ], title: "CVE-2021-42327", }, { cve: "CVE-2021-47202", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47202", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal: Fix NULL pointer dereferences in of_thermal_ functions\n\nof_parse_thermal_zones() parses the thermal-zones node and registers a\nthermal_zone device for each subnode. However, if a thermal zone is\nconsuming a thermal sensor and that thermal sensor device hasn't probed\nyet, an attempt to set trip_point_*_temp for that thermal zone device\ncan cause a NULL pointer dereference. Fix it.\n\n console:/sys/class/thermal/thermal_zone87 # echo 120000 > trip_point_0_temp\n ...\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020\n ...\n Call trace:\n of_thermal_set_trip_temp+0x40/0xc4\n trip_point_temp_store+0xc0/0x1dc\n dev_attr_store+0x38/0x88\n sysfs_kf_write+0x64/0xc0\n kernfs_fop_write_iter+0x108/0x1d0\n vfs_write+0x2f4/0x368\n ksys_write+0x7c/0xec\n __arm64_sys_write+0x20/0x30\n el0_svc_common.llvm.7279915941325364641+0xbc/0x1bc\n do_el0_svc+0x28/0xa0\n el0_svc+0x14/0x24\n el0_sync_handler+0x88/0xec\n el0_sync+0x1c0/0x200\n\nWhile at it, fix the possible NULL pointer dereference in other\nfunctions as well: of_thermal_get_temp(), of_thermal_set_emul_temp(),\nof_thermal_get_trend().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-47202", url: "https://www.suse.com/security/cve/CVE-2021-47202", }, { category: "external", summary: "SUSE Bug 1222878 for CVE-2021-47202", url: "https://bugzilla.suse.com/1222878", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2021-47202", }, { cve: "CVE-2021-47365", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47365", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nafs: Fix page leak\n\nThere's a loop in afs_extend_writeback() that adds extra pages to a write\nwe want to make to improve the efficiency of the writeback by making it\nlarger. This loop stops, however, if we hit a page we can't write back\nfrom immediately, but it doesn't get rid of the page ref we speculatively\nacquired.\n\nThis was caused by the removal of the cleanup loop when the code switched\nfrom using find_get_pages_contig() to xarray scanning as the latter only\ngets a single page at a time, not a batch.\n\nFix this by putting the page on a ref on an early break from the loop.\nUnfortunately, we can't just add that page to the pagevec we're employing\nas we'll go through that and add those pages to the RPC call.\n\nThis was found by the generic/074 test. It leaks ~4GiB of RAM each time it\nis run - which can be observed with \"top\".", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-47365", url: "https://www.suse.com/security/cve/CVE-2021-47365", }, { category: "external", summary: "SUSE Bug 1224895 for CVE-2021-47365", url: "https://bugzilla.suse.com/1224895", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2021-47365", }, { cve: "CVE-2021-47489", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47489", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix even more out of bound writes from debugfs\n\nCVE-2021-42327 was fixed by:\n\ncommit f23750b5b3d98653b31d4469592935ef6364ad67\nAuthor: Thelford Williams <tdwilliamsiv@gmail.com>\nDate: Wed Oct 13 16:04:13 2021 -0400\n\n drm/amdgpu: fix out of bounds write\n\nbut amdgpu_dm_debugfs.c contains more of the same issue so fix the\nremaining ones.\n\nv2:\n\t* Add missing fix in dp_max_bpc_write (Harry Wentland)", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-47489", url: "https://www.suse.com/security/cve/CVE-2021-47489", }, { category: "external", summary: "SUSE Bug 1224901 for CVE-2021-47489", url: "https://bugzilla.suse.com/1224901", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2021-47489", }, { cve: "CVE-2021-47491", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47491", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: khugepaged: skip huge page collapse for special files\n\nThe read-only THP for filesystems will collapse THP for files opened\nreadonly and mapped with VM_EXEC. The intended usecase is to avoid TLB\nmisses for large text segments. But it doesn't restrict the file types\nso a THP could be collapsed for a non-regular file, for example, block\ndevice, if it is opened readonly and mapped with EXEC permission. This\nmay cause bugs, like [1] and [2].\n\nThis is definitely not the intended usecase, so just collapse THP for\nregular files in order to close the attack surface.\n\n[shy828301@gmail.com: fix vm_file check [3]]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-47491", url: "https://www.suse.com/security/cve/CVE-2021-47491", }, { category: "external", summary: "SUSE Bug 1224900 for CVE-2021-47491", url: "https://bugzilla.suse.com/1224900", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2021-47491", }, { cve: "CVE-2021-47492", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-47492", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmm, thp: bail out early in collapse_file for writeback page\n\nCurrently collapse_file does not explicitly check PG_writeback, instead,\npage_has_private and try_to_release_page are used to filter writeback\npages. This does not work for xfs with blocksize equal to or larger\nthan pagesize, because in such case xfs has no page->private.\n\nThis makes collapse_file bail out early for writeback page. Otherwise,\nxfs end_page_writeback will panic as follows.\n\n page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:ffff0003f88c86a8 index:0x0 pfn:0x84ef32\n aops:xfs_address_space_operations [xfs] ino:30000b7 dentry name:\"libtest.so\"\n flags: 0x57fffe0000008027(locked|referenced|uptodate|active|writeback)\n raw: 57fffe0000008027 ffff80001b48bc28 ffff80001b48bc28 ffff0003f88c86a8\n raw: 0000000000000000 0000000000000000 00000000ffffffff ffff0000c3e9a000\n page dumped because: VM_BUG_ON_PAGE(((unsigned int) page_ref_count(page) + 127u <= 127u))\n page->mem_cgroup:ffff0000c3e9a000\n ------------[ cut here ]------------\n kernel BUG at include/linux/mm.h:1212!\n Internal error: Oops - BUG: 0 [#1] SMP\n Modules linked in:\n BUG: Bad page state in process khugepaged pfn:84ef32\n xfs(E)\n page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:0 index:0x0 pfn:0x84ef32\n libcrc32c(E) rfkill(E) aes_ce_blk(E) crypto_simd(E) ...\n CPU: 25 PID: 0 Comm: swapper/25 Kdump: loaded Tainted: ...\n pstate: 60400005 (nZCv daif +PAN -UAO -TCO BTYPE=--)\n Call trace:\n end_page_writeback+0x1c0/0x214\n iomap_finish_page_writeback+0x13c/0x204\n iomap_finish_ioend+0xe8/0x19c\n iomap_writepage_end_bio+0x38/0x50\n bio_endio+0x168/0x1ec\n blk_update_request+0x278/0x3f0\n blk_mq_end_request+0x34/0x15c\n virtblk_request_done+0x38/0x74 [virtio_blk]\n blk_done_softirq+0xc4/0x110\n __do_softirq+0x128/0x38c\n __irq_exit_rcu+0x118/0x150\n irq_exit+0x1c/0x30\n __handle_domain_irq+0x8c/0xf0\n gic_handle_irq+0x84/0x108\n el1_irq+0xcc/0x180\n arch_cpu_idle+0x18/0x40\n default_idle_call+0x4c/0x1a0\n cpuidle_idle_call+0x168/0x1e0\n do_idle+0xb4/0x104\n cpu_startup_entry+0x30/0x9c\n secondary_start_kernel+0x104/0x180\n Code: d4210000 b0006161 910c8021 94013f4d (d4210000)\n ---[ end trace 4a88c6a074082f8c ]---\n Kernel panic - not syncing: Oops - BUG: Fatal exception in interrupt", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-47492", url: "https://www.suse.com/security/cve/CVE-2021-47492", }, { category: "external", summary: "SUSE Bug 1224898 for CVE-2021-47492", url: "https://bugzilla.suse.com/1224898", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2021-47492", }, { cve: "CVE-2022-48632", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48632", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()\n\nmemcpy() is called in a loop while 'operation->length' upper bound\nis not checked and 'data_idx' also increments.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48632", url: "https://www.suse.com/security/cve/CVE-2022-48632", }, { category: "external", summary: "SUSE Bug 1223481 for CVE-2022-48632", url: "https://bugzilla.suse.com/1223481", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2022-48632", }, { cve: "CVE-2022-48634", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48634", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/gma500: Fix BUG: sleeping function called from invalid context errors\n\ngma_crtc_page_flip() was holding the event_lock spinlock while calling\ncrtc_funcs->mode_set_base() which takes ww_mutex.\n\nThe only reason to hold event_lock is to clear gma_crtc->page_flip_event\non mode_set_base() errors.\n\nInstead unlock it after setting gma_crtc->page_flip_event and on\nerrors re-take the lock and clear gma_crtc->page_flip_event it\nit is still set.\n\nThis fixes the following WARN/stacktrace:\n\n[ 512.122953] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:870\n[ 512.123004] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 1253, name: gnome-shell\n[ 512.123031] preempt_count: 1, expected: 0\n[ 512.123048] RCU nest depth: 0, expected: 0\n[ 512.123066] INFO: lockdep is turned off.\n[ 512.123080] irq event stamp: 0\n[ 512.123094] hardirqs last enabled at (0): [<0000000000000000>] 0x0\n[ 512.123134] hardirqs last disabled at (0): [<ffffffff8d0ec28c>] copy_process+0x9fc/0x1de0\n[ 512.123176] softirqs last enabled at (0): [<ffffffff8d0ec28c>] copy_process+0x9fc/0x1de0\n[ 512.123207] softirqs last disabled at (0): [<0000000000000000>] 0x0\n[ 512.123233] Preemption disabled at:\n[ 512.123241] [<0000000000000000>] 0x0\n[ 512.123275] CPU: 3 PID: 1253 Comm: gnome-shell Tainted: G W 5.19.0+ #1\n[ 512.123304] Hardware name: Packard Bell dot s/SJE01_CT, BIOS V1.10 07/23/2013\n[ 512.123323] Call Trace:\n[ 512.123346] <TASK>\n[ 512.123370] dump_stack_lvl+0x5b/0x77\n[ 512.123412] __might_resched.cold+0xff/0x13a\n[ 512.123458] ww_mutex_lock+0x1e/0xa0\n[ 512.123495] psb_gem_pin+0x2c/0x150 [gma500_gfx]\n[ 512.123601] gma_pipe_set_base+0x76/0x240 [gma500_gfx]\n[ 512.123708] gma_crtc_page_flip+0x95/0x130 [gma500_gfx]\n[ 512.123808] drm_mode_page_flip_ioctl+0x57d/0x5d0\n[ 512.123897] ? drm_mode_cursor2_ioctl+0x10/0x10\n[ 512.123936] drm_ioctl_kernel+0xa1/0x150\n[ 512.123984] drm_ioctl+0x21f/0x420\n[ 512.124025] ? drm_mode_cursor2_ioctl+0x10/0x10\n[ 512.124070] ? rcu_read_lock_bh_held+0xb/0x60\n[ 512.124104] ? lock_release+0x1ef/0x2d0\n[ 512.124161] __x64_sys_ioctl+0x8d/0xd0\n[ 512.124203] do_syscall_64+0x58/0x80\n[ 512.124239] ? do_syscall_64+0x67/0x80\n[ 512.124267] ? trace_hardirqs_on_prepare+0x55/0xe0\n[ 512.124300] ? do_syscall_64+0x67/0x80\n[ 512.124340] ? rcu_read_lock_sched_held+0x10/0x80\n[ 512.124377] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 512.124411] RIP: 0033:0x7fcc4a70740f\n[ 512.124442] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00\n[ 512.124470] RSP: 002b:00007ffda73f5390 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\n[ 512.124503] RAX: ffffffffffffffda RBX: 000055cc9e474500 RCX: 00007fcc4a70740f\n[ 512.124524] RDX: 00007ffda73f5420 RSI: 00000000c01864b0 RDI: 0000000000000009\n[ 512.124544] RBP: 00007ffda73f5420 R08: 000055cc9c0b0cb0 R09: 0000000000000034\n[ 512.124564] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000c01864b0\n[ 512.124584] R13: 0000000000000009 R14: 000055cc9df484d0 R15: 000055cc9af5d0c0\n[ 512.124647] </TASK>", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48634", url: "https://www.suse.com/security/cve/CVE-2022-48634", }, { category: "external", summary: "SUSE Bug 1223501 for CVE-2022-48634", url: "https://bugzilla.suse.com/1223501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2022-48634", }, { cve: "CVE-2022-48636", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48636", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup\n\nFix Oops in dasd_alias_get_start_dev() function caused by the pavgroup\npointer being NULL.\n\nThe pavgroup pointer is checked on the entrance of the function but\nwithout the lcu->lock being held. Therefore there is a race window\nbetween dasd_alias_get_start_dev() and _lcu_update() which sets\npavgroup to NULL with the lcu->lock held.\n\nFix by checking the pavgroup pointer with lcu->lock held.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48636", url: "https://www.suse.com/security/cve/CVE-2022-48636", }, { category: "external", summary: "SUSE Bug 1223512 for CVE-2022-48636", url: "https://bugzilla.suse.com/1223512", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2022-48636", }, { cve: "CVE-2022-48652", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48652", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix crash by keep old cfg when update TCs more than queues\n\nThere are problems if allocated queues less than Traffic Classes.\n\nCommit a632b2a4c920 (\"ice: ethtool: Prohibit improper channel config\nfor DCB\") already disallow setting less queues than TCs.\n\nAnother case is if we first set less queues, and later update more TCs\nconfig due to LLDP, ice_vsi_cfg_tc() will failed but left dirty\nnum_txq/rxq and tc_cfg in vsi, that will cause invalid pointer access.\n\n[ 95.968089] ice 0000:3b:00.1: More TCs defined than queues/rings allocated.\n[ 95.968092] ice 0000:3b:00.1: Trying to use more Rx queues (8), than were allocated (1)!\n[ 95.968093] ice 0000:3b:00.1: Failed to config TC for VSI index: 0\n[ 95.969621] general protection fault: 0000 [#1] SMP NOPTI\n[ 95.969705] CPU: 1 PID: 58405 Comm: lldpad Kdump: loaded Tainted: G U W O --------- -t - 4.18.0 #1\n[ 95.969867] Hardware name: O.E.M/BC11SPSCB10, BIOS 8.23 12/30/2021\n[ 95.969992] RIP: 0010:devm_kmalloc+0xa/0x60\n[ 95.970052] Code: 5c ff ff ff 31 c0 5b 5d 41 5c c3 b8 f4 ff ff ff eb f4 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 89 d1 <8b> 97 60 02 00 00 48 8d 7e 18 48 39 f7 72 3f 55 89 ce 53 48 8b 4c\n[ 95.970344] RSP: 0018:ffffc9003f553888 EFLAGS: 00010206\n[ 95.970425] RAX: dead000000000200 RBX: ffffea003c425b00 RCX: 00000000006080c0\n[ 95.970536] RDX: 00000000006080c0 RSI: 0000000000000200 RDI: dead000000000200\n[ 95.970648] RBP: dead000000000200 R08: 00000000000463c0 R09: ffff888ffa900000\n[ 95.970760] R10: 0000000000000000 R11: 0000000000000002 R12: ffff888ff6b40100\n[ 95.970870] R13: ffff888ff6a55018 R14: 0000000000000000 R15: ffff888ff6a55460\n[ 95.970981] FS: 00007f51b7d24700(0000) GS:ffff88903ee80000(0000) knlGS:0000000000000000\n[ 95.971108] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 95.971197] CR2: 00007fac5410d710 CR3: 0000000f2c1de002 CR4: 00000000007606e0\n[ 95.971309] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 95.971419] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 95.971530] PKRU: 55555554\n[ 95.971573] Call Trace:\n[ 95.971622] ice_setup_rx_ring+0x39/0x110 [ice]\n[ 95.971695] ice_vsi_setup_rx_rings+0x54/0x90 [ice]\n[ 95.971774] ice_vsi_open+0x25/0x120 [ice]\n[ 95.971843] ice_open_internal+0xb8/0x1f0 [ice]\n[ 95.971919] ice_ena_vsi+0x4f/0xd0 [ice]\n[ 95.971987] ice_dcb_ena_dis_vsi.constprop.5+0x29/0x90 [ice]\n[ 95.972082] ice_pf_dcb_cfg+0x29a/0x380 [ice]\n[ 95.972154] ice_dcbnl_setets+0x174/0x1b0 [ice]\n[ 95.972220] dcbnl_ieee_set+0x89/0x230\n[ 95.972279] ? dcbnl_ieee_del+0x150/0x150\n[ 95.972341] dcb_doit+0x124/0x1b0\n[ 95.972392] rtnetlink_rcv_msg+0x243/0x2f0\n[ 95.972457] ? dcb_doit+0x14d/0x1b0\n[ 95.972510] ? __kmalloc_node_track_caller+0x1d3/0x280\n[ 95.972591] ? rtnl_calcit.isra.31+0x100/0x100\n[ 95.972661] netlink_rcv_skb+0xcf/0xf0\n[ 95.972720] netlink_unicast+0x16d/0x220\n[ 95.972781] netlink_sendmsg+0x2ba/0x3a0\n[ 95.975891] sock_sendmsg+0x4c/0x50\n[ 95.979032] ___sys_sendmsg+0x2e4/0x300\n[ 95.982147] ? kmem_cache_alloc+0x13e/0x190\n[ 95.985242] ? __wake_up_common_lock+0x79/0x90\n[ 95.988338] ? __check_object_size+0xac/0x1b0\n[ 95.991440] ? _copy_to_user+0x22/0x30\n[ 95.994539] ? move_addr_to_user+0xbb/0xd0\n[ 95.997619] ? __sys_sendmsg+0x53/0x80\n[ 96.000664] __sys_sendmsg+0x53/0x80\n[ 96.003747] do_syscall_64+0x5b/0x1d0\n[ 96.006862] entry_SYSCALL_64_after_hwframe+0x65/0xca\n\nOnly update num_txq/rxq when passed check, and restore tc_cfg if setup\nqueue map failed.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48652", url: "https://www.suse.com/security/cve/CVE-2022-48652", }, { category: "external", summary: "SUSE Bug 1223520 for CVE-2022-48652", url: "https://bugzilla.suse.com/1223520", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2022-48652", }, { cve: "CVE-2022-48671", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48671", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncgroup: Add missing cpus_read_lock() to cgroup_attach_task_all()\n\nsyzbot is hitting percpu_rwsem_assert_held(&cpu_hotplug_lock) warning at\ncpuset_attach() [1], for commit 4f7e7236435ca0ab (\"cgroup: Fix\nthreadgroup_rwsem <-> cpus_read_lock() deadlock\") missed that\ncpuset_attach() is also called from cgroup_attach_task_all().\nAdd cpus_read_lock() like what cgroup_procs_write_start() does.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48671", url: "https://www.suse.com/security/cve/CVE-2022-48671", }, { category: "external", summary: "SUSE Bug 1223929 for CVE-2022-48671", url: "https://bugzilla.suse.com/1223929", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2022-48671", }, { cve: "CVE-2022-48672", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48672", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nof: fdt: fix off-by-one error in unflatten_dt_nodes()\n\nCommit 78c44d910d3e (\"drivers/of: Fix depth when unflattening devicetree\")\nforgot to fix up the depth check in the loop body in unflatten_dt_nodes()\nwhich makes it possible to overflow the nps[] buffer...\n\nFound by Linux Verification Center (linuxtesting.org) with the SVACE static\nanalysis tool.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48672", url: "https://www.suse.com/security/cve/CVE-2022-48672", }, { category: "external", summary: "SUSE Bug 1223931 for CVE-2022-48672", url: "https://bugzilla.suse.com/1223931", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2022-48672", }, { cve: "CVE-2022-48673", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48673", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: Fix possible access to freed memory in link clear\n\nAfter modifying the QP to the Error state, all RX WR would be completed\nwith WC in IB_WC_WR_FLUSH_ERR status. Current implementation does not\nwait for it is done, but destroy the QP and free the link group directly.\nSo there is a risk that accessing the freed memory in tasklet context.\n\nHere is a crash example:\n\n BUG: unable to handle page fault for address: ffffffff8f220860\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD f7300e067 P4D f7300e067 PUD f7300f063 PMD 8c4e45063 PTE 800ffff08c9df060\n Oops: 0002 [#1] SMP PTI\n CPU: 1 PID: 0 Comm: swapper/1 Kdump: loaded Tainted: G S OE 5.10.0-0607+ #23\n Hardware name: Inspur NF5280M4/YZMB-00689-101, BIOS 4.1.20 07/09/2018\n RIP: 0010:native_queued_spin_lock_slowpath+0x176/0x1b0\n Code: f3 90 48 8b 32 48 85 f6 74 f6 eb d5 c1 ee 12 83 e0 03 83 ee 01 48 c1 e0 05 48 63 f6 48 05 00 c8 02 00 48 03 04 f5 00 09 98 8e <48> 89 10 8b 42 08 85 c0 75 09 f3 90 8b 42 08 85 c0 74 f7 48 8b 32\n RSP: 0018:ffffb3b6c001ebd8 EFLAGS: 00010086\n RAX: ffffffff8f220860 RBX: 0000000000000246 RCX: 0000000000080000\n RDX: ffff91db1f86c800 RSI: 000000000000173c RDI: ffff91db62bace00\n RBP: ffff91db62bacc00 R08: 0000000000000000 R09: c00000010000028b\n R10: 0000000000055198 R11: ffffb3b6c001ea58 R12: ffff91db80e05010\n R13: 000000000000000a R14: 0000000000000006 R15: 0000000000000040\n FS: 0000000000000000(0000) GS:ffff91db1f840000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: ffffffff8f220860 CR3: 00000001f9580004 CR4: 00000000003706e0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n <IRQ>\n _raw_spin_lock_irqsave+0x30/0x40\n mlx5_ib_poll_cq+0x4c/0xc50 [mlx5_ib]\n smc_wr_rx_tasklet_fn+0x56/0xa0 [smc]\n tasklet_action_common.isra.21+0x66/0x100\n __do_softirq+0xd5/0x29c\n asm_call_irq_on_stack+0x12/0x20\n </IRQ>\n do_softirq_own_stack+0x37/0x40\n irq_exit_rcu+0x9d/0xa0\n sysvec_call_function_single+0x34/0x80\n asm_sysvec_call_function_single+0x12/0x20", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48673", url: "https://www.suse.com/security/cve/CVE-2022-48673", }, { category: "external", summary: "SUSE Bug 1223934 for CVE-2022-48673", url: "https://bugzilla.suse.com/1223934", }, { category: "external", summary: "SUSE Bug 1223940 for CVE-2022-48673", url: "https://bugzilla.suse.com/1223940", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2022-48673", }, { cve: "CVE-2022-48675", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48675", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/core: Fix a nested dead lock as part of ODP flow\n\nFix a nested dead lock as part of ODP flow by using mmput_async().\n\nFrom the below call trace [1] can see that calling mmput() once we have\nthe umem_odp->umem_mutex locked as required by\nib_umem_odp_map_dma_and_lock() might trigger in the same task the\nexit_mmap()->__mmu_notifier_release()->mlx5_ib_invalidate_range() which\nmay dead lock when trying to lock the same mutex.\n\nMoving to use mmput_async() will solve the problem as the above\nexit_mmap() flow will be called in other task and will be executed once\nthe lock will be available.\n\n[1]\n[64843.077665] task:kworker/u133:2 state:D stack: 0 pid:80906 ppid:\n2 flags:0x00004000\n[64843.077672] Workqueue: mlx5_ib_page_fault mlx5_ib_eqe_pf_action [mlx5_ib]\n[64843.077719] Call Trace:\n[64843.077722] <TASK>\n[64843.077724] __schedule+0x23d/0x590\n[64843.077729] schedule+0x4e/0xb0\n[64843.077735] schedule_preempt_disabled+0xe/0x10\n[64843.077740] __mutex_lock.constprop.0+0x263/0x490\n[64843.077747] __mutex_lock_slowpath+0x13/0x20\n[64843.077752] mutex_lock+0x34/0x40\n[64843.077758] mlx5_ib_invalidate_range+0x48/0x270 [mlx5_ib]\n[64843.077808] __mmu_notifier_release+0x1a4/0x200\n[64843.077816] exit_mmap+0x1bc/0x200\n[64843.077822] ? walk_page_range+0x9c/0x120\n[64843.077828] ? __cond_resched+0x1a/0x50\n[64843.077833] ? mutex_lock+0x13/0x40\n[64843.077839] ? uprobe_clear_state+0xac/0x120\n[64843.077860] mmput+0x5f/0x140\n[64843.077867] ib_umem_odp_map_dma_and_lock+0x21b/0x580 [ib_core]\n[64843.077931] pagefault_real_mr+0x9a/0x140 [mlx5_ib]\n[64843.077962] pagefault_mr+0xb4/0x550 [mlx5_ib]\n[64843.077992] pagefault_single_data_segment.constprop.0+0x2ac/0x560\n[mlx5_ib]\n[64843.078022] mlx5_ib_eqe_pf_action+0x528/0x780 [mlx5_ib]\n[64843.078051] process_one_work+0x22b/0x3d0\n[64843.078059] worker_thread+0x53/0x410\n[64843.078065] ? process_one_work+0x3d0/0x3d0\n[64843.078073] kthread+0x12a/0x150\n[64843.078079] ? set_kthread_struct+0x50/0x50\n[64843.078085] ret_from_fork+0x22/0x30\n[64843.078093] </TASK>", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48675", url: "https://www.suse.com/security/cve/CVE-2022-48675", }, { category: "external", summary: "SUSE Bug 1223894 for CVE-2022-48675", url: "https://bugzilla.suse.com/1223894", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2022-48675", }, { cve: "CVE-2022-48686", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48686", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: fix UAF when detecting digest errors\n\nWe should also bail from the io_work loop when we set rd_enabled to true,\nso we don't attempt to read data from the socket when the TCP stream is\nalready out-of-sync or corrupted.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48686", url: "https://www.suse.com/security/cve/CVE-2022-48686", }, { category: "external", summary: "SUSE Bug 1223948 for CVE-2022-48686", url: "https://bugzilla.suse.com/1223948", }, { category: "external", summary: "SUSE Bug 1226337 for CVE-2022-48686", url: "https://bugzilla.suse.com/1226337", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "important", }, ], title: "CVE-2022-48686", }, { cve: "CVE-2022-48687", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48687", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: sr: fix out-of-bounds read when setting HMAC data.\n\nThe SRv6 layer allows defining HMAC data that can later be used to sign IPv6\nSegment Routing Headers. This configuration is realised via netlink through\nfour attributes: SEG6_ATTR_HMACKEYID, SEG6_ATTR_SECRET, SEG6_ATTR_SECRETLEN and\nSEG6_ATTR_ALGID. Because the SECRETLEN attribute is decoupled from the actual\nlength of the SECRET attribute, it is possible to provide invalid combinations\n(e.g., secret = \"\", secretlen = 64). This case is not checked in the code and\nwith an appropriately crafted netlink message, an out-of-bounds read of up\nto 64 bytes (max secret length) can occur past the skb end pointer and into\nskb_shared_info:\n\nBreakpoint 1, seg6_genl_sethmac (skb=<optimized out>, info=<optimized out>) at net/ipv6/seg6.c:208\n208\t\tmemcpy(hinfo->secret, secret, slen);\n(gdb) bt\n #0 seg6_genl_sethmac (skb=<optimized out>, info=<optimized out>) at net/ipv6/seg6.c:208\n #1 0xffffffff81e012e9 in genl_family_rcv_msg_doit (skb=skb@entry=0xffff88800b1f9f00, nlh=nlh@entry=0xffff88800b1b7600,\n extack=extack@entry=0xffffc90000ba7af0, ops=ops@entry=0xffffc90000ba7a80, hdrlen=4, net=0xffffffff84237580 <init_net>, family=<optimized out>,\n family=<optimized out>) at net/netlink/genetlink.c:731\n #2 0xffffffff81e01435 in genl_family_rcv_msg (extack=0xffffc90000ba7af0, nlh=0xffff88800b1b7600, skb=0xffff88800b1f9f00,\n family=0xffffffff82fef6c0 <seg6_genl_family>) at net/netlink/genetlink.c:775\n #3 genl_rcv_msg (skb=0xffff88800b1f9f00, nlh=0xffff88800b1b7600, extack=0xffffc90000ba7af0) at net/netlink/genetlink.c:792\n #4 0xffffffff81dfffc3 in netlink_rcv_skb (skb=skb@entry=0xffff88800b1f9f00, cb=cb@entry=0xffffffff81e01350 <genl_rcv_msg>)\n at net/netlink/af_netlink.c:2501\n #5 0xffffffff81e00919 in genl_rcv (skb=0xffff88800b1f9f00) at net/netlink/genetlink.c:803\n #6 0xffffffff81dff6ae in netlink_unicast_kernel (ssk=0xffff888010eec800, skb=0xffff88800b1f9f00, sk=0xffff888004aed000)\n at net/netlink/af_netlink.c:1319\n #7 netlink_unicast (ssk=ssk@entry=0xffff888010eec800, skb=skb@entry=0xffff88800b1f9f00, portid=portid@entry=0, nonblock=<optimized out>)\n at net/netlink/af_netlink.c:1345\n #8 0xffffffff81dff9a4 in netlink_sendmsg (sock=<optimized out>, msg=0xffffc90000ba7e48, len=<optimized out>) at net/netlink/af_netlink.c:1921\n...\n(gdb) p/x ((struct sk_buff *)0xffff88800b1f9f00)->head + ((struct sk_buff *)0xffff88800b1f9f00)->end\n$1 = 0xffff88800b1b76c0\n(gdb) p/x secret\n$2 = 0xffff88800b1b76c0\n(gdb) p slen\n$3 = 64 '@'\n\nThe OOB data can then be read back from userspace by dumping HMAC state. This\ncommit fixes this by ensuring SECRETLEN cannot exceed the actual length of\nSECRET.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48687", url: "https://www.suse.com/security/cve/CVE-2022-48687", }, { category: "external", summary: "SUSE Bug 1223952 for CVE-2022-48687", url: "https://bugzilla.suse.com/1223952", }, { category: "external", summary: "SUSE Bug 1224043 for CVE-2022-48687", url: "https://bugzilla.suse.com/1224043", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "important", }, ], title: "CVE-2022-48687", }, { cve: "CVE-2022-48688", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48688", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix kernel crash during module removal\n\nThe driver incorrectly frees client instance and subsequent\ni40e module removal leads to kernel crash.\n\nReproducer:\n1. Do ethtool offline test followed immediately by another one\nhost# ethtool -t eth0 offline; ethtool -t eth0 offline\n2. Remove recursively irdma module that also removes i40e module\nhost# modprobe -r irdma\n\nResult:\n[ 8675.035651] i40e 0000:3d:00.0 eno1: offline testing starting\n[ 8675.193774] i40e 0000:3d:00.0 eno1: testing finished\n[ 8675.201316] i40e 0000:3d:00.0 eno1: offline testing starting\n[ 8675.358921] i40e 0000:3d:00.0 eno1: testing finished\n[ 8675.496921] i40e 0000:3d:00.0: IRDMA hardware initialization FAILED init_state=2 status=-110\n[ 8686.188955] i40e 0000:3d:00.1: i40e_ptp_stop: removed PHC on eno2\n[ 8686.943890] i40e 0000:3d:00.1: Deleted LAN device PF1 bus=0x3d dev=0x00 func=0x01\n[ 8686.952669] i40e 0000:3d:00.0: i40e_ptp_stop: removed PHC on eno1\n[ 8687.761787] BUG: kernel NULL pointer dereference, address: 0000000000000030\n[ 8687.768755] #PF: supervisor read access in kernel mode\n[ 8687.773895] #PF: error_code(0x0000) - not-present page\n[ 8687.779034] PGD 0 P4D 0\n[ 8687.781575] Oops: 0000 [#1] PREEMPT SMP NOPTI\n[ 8687.785935] CPU: 51 PID: 172891 Comm: rmmod Kdump: loaded Tainted: G W I 5.19.0+ #2\n[ 8687.794800] Hardware name: Intel Corporation S2600WFD/S2600WFD, BIOS SE5C620.86B.0X.02.0001.051420190324 05/14/2019\n[ 8687.805222] RIP: 0010:i40e_lan_del_device+0x13/0xb0 [i40e]\n[ 8687.810719] Code: d4 84 c0 0f 84 b8 25 01 00 e9 9c 25 01 00 41 bc f4 ff ff ff eb 91 90 0f 1f 44 00 00 41 54 55 53 48 8b 87 58 08 00 00 48 89 fb <48> 8b 68 30 48 89 ef e8 21 8a 0f d5 48 89 ef e8 a9 78 0f d5 48 8b\n[ 8687.829462] RSP: 0018:ffffa604072efce0 EFLAGS: 00010202\n[ 8687.834689] RAX: 0000000000000000 RBX: ffff8f43833b2000 RCX: 0000000000000000\n[ 8687.841821] RDX: 0000000000000000 RSI: ffff8f4b0545b298 RDI: ffff8f43833b2000\n[ 8687.848955] RBP: ffff8f43833b2000 R08: 0000000000000001 R09: 0000000000000000\n[ 8687.856086] R10: 0000000000000000 R11: 000ffffffffff000 R12: ffff8f43833b2ef0\n[ 8687.863218] R13: ffff8f43833b2ef0 R14: ffff915103966000 R15: ffff8f43833b2008\n[ 8687.870342] FS: 00007f79501c3740(0000) GS:ffff8f4adffc0000(0000) knlGS:0000000000000000\n[ 8687.878427] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 8687.884174] CR2: 0000000000000030 CR3: 000000014276e004 CR4: 00000000007706e0\n[ 8687.891306] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 8687.898441] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 8687.905572] PKRU: 55555554\n[ 8687.908286] Call Trace:\n[ 8687.910737] <TASK>\n[ 8687.912843] i40e_remove+0x2c0/0x330 [i40e]\n[ 8687.917040] pci_device_remove+0x33/0xa0\n[ 8687.920962] device_release_driver_internal+0x1aa/0x230\n[ 8687.926188] driver_detach+0x44/0x90\n[ 8687.929770] bus_remove_driver+0x55/0xe0\n[ 8687.933693] pci_unregister_driver+0x2a/0xb0\n[ 8687.937967] i40e_exit_module+0xc/0xf48 [i40e]\n\nTwo offline tests cause IRDMA driver failure (ETIMEDOUT) and this\nfailure is indicated back to i40e_client_subtask() that calls\ni40e_client_del_instance() to free client instance referenced\nby pf->cinst and sets this pointer to NULL. During the module\nremoval i40e_remove() calls i40e_lan_del_device() that dereferences\npf->cinst that is NULL -> crash.\nDo not remove client instance when client open callbacks fails and\njust clear __I40E_CLIENT_INSTANCE_OPENED bit. The driver also needs\nto take care about this situation (when netdev is up and client\nis NOT opened) in i40e_notify_client_of_netdev_close() and\ncalls client close callback only when __I40E_CLIENT_INSTANCE_OPENED\nis set.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48688", url: "https://www.suse.com/security/cve/CVE-2022-48688", }, { category: "external", summary: "SUSE Bug 1223953 for CVE-2022-48688", url: "https://bugzilla.suse.com/1223953", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2022-48688", }, { cve: "CVE-2022-48692", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48692", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srp: Set scmnd->result only when scmnd is not NULL\n\nThis change fixes the following kernel NULL pointer dereference\nwhich is reproduced by blktests srp/007 occasionally.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000170\nPGD 0 P4D 0\nOops: 0002 [#1] PREEMPT SMP NOPTI\nCPU: 0 PID: 9 Comm: kworker/0:1H Kdump: loaded Not tainted 6.0.0-rc1+ #37\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.15.0-29-g6a62e0cb0dfe-prebuilt.qemu.org 04/01/2014\nWorkqueue: 0x0 (kblockd)\nRIP: 0010:srp_recv_done+0x176/0x500 [ib_srp]\nCode: 00 4d 85 ff 0f 84 52 02 00 00 48 c7 82 80 02 00 00 00 00 00 00 4c 89 df 4c 89 14 24 e8 53 d3 4a f6 4c 8b 14 24 41 0f b6 42 13 <41> 89 87 70 01 00 00 41 0f b6 52 12 f6 c2 02 74 44 41 8b 42 1c b9\nRSP: 0018:ffffaef7c0003e28 EFLAGS: 00000282\nRAX: 0000000000000000 RBX: ffff9bc9486dea60 RCX: 0000000000000000\nRDX: 0000000000000102 RSI: ffffffffb76bbd0e RDI: 00000000ffffffff\nRBP: ffff9bc980099a00 R08: 0000000000000001 R09: 0000000000000001\nR10: ffff9bca53ef0000 R11: ffff9bc980099a10 R12: ffff9bc956e14000\nR13: ffff9bc9836b9cb0 R14: ffff9bc9557b4480 R15: 0000000000000000\nFS: 0000000000000000(0000) GS:ffff9bc97ec00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000170 CR3: 0000000007e04000 CR4: 00000000000006f0\nCall Trace:\n <IRQ>\n __ib_process_cq+0xb7/0x280 [ib_core]\n ib_poll_handler+0x2b/0x130 [ib_core]\n irq_poll_softirq+0x93/0x150\n __do_softirq+0xee/0x4b8\n irq_exit_rcu+0xf7/0x130\n sysvec_apic_timer_interrupt+0x8e/0xc0\n </IRQ>", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48692", url: "https://www.suse.com/security/cve/CVE-2022-48692", }, { category: "external", summary: "SUSE Bug 1223962 for CVE-2022-48692", url: "https://bugzilla.suse.com/1223962", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2022-48692", }, { cve: "CVE-2022-48693", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48693", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs\n\nIn brcmstb_pm_probe(), there are two kinds of leak bugs:\n\n(1) we need to add of_node_put() when for_each__matching_node() breaks\n(2) we need to add iounmap() for each iomap in fail path", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48693", url: "https://www.suse.com/security/cve/CVE-2022-48693", }, { category: "external", summary: "SUSE Bug 1223963 for CVE-2022-48693", url: "https://bugzilla.suse.com/1223963", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2022-48693", }, { cve: "CVE-2022-48694", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48694", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: Fix drain SQ hang with no completion\n\nSW generated completions for outstanding WRs posted on SQ\nafter QP is in error target the wrong CQ. This causes the\nib_drain_sq to hang with no completion.\n\nFix this to generate completions on the right CQ.\n\n[ 863.969340] INFO: task kworker/u52:2:671 blocked for more than 122 seconds.\n[ 863.979224] Not tainted 5.14.0-130.el9.x86_64 #1\n[ 863.986588] \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[ 863.996997] task:kworker/u52:2 state:D stack: 0 pid: 671 ppid: 2 flags:0x00004000\n[ 864.007272] Workqueue: xprtiod xprt_autoclose [sunrpc]\n[ 864.014056] Call Trace:\n[ 864.017575] __schedule+0x206/0x580\n[ 864.022296] schedule+0x43/0xa0\n[ 864.026736] schedule_timeout+0x115/0x150\n[ 864.032185] __wait_for_common+0x93/0x1d0\n[ 864.037717] ? usleep_range_state+0x90/0x90\n[ 864.043368] __ib_drain_sq+0xf6/0x170 [ib_core]\n[ 864.049371] ? __rdma_block_iter_next+0x80/0x80 [ib_core]\n[ 864.056240] ib_drain_sq+0x66/0x70 [ib_core]\n[ 864.062003] rpcrdma_xprt_disconnect+0x82/0x3b0 [rpcrdma]\n[ 864.069365] ? xprt_prepare_transmit+0x5d/0xc0 [sunrpc]\n[ 864.076386] xprt_rdma_close+0xe/0x30 [rpcrdma]\n[ 864.082593] xprt_autoclose+0x52/0x100 [sunrpc]\n[ 864.088718] process_one_work+0x1e8/0x3c0\n[ 864.094170] worker_thread+0x50/0x3b0\n[ 864.099109] ? rescuer_thread+0x370/0x370\n[ 864.104473] kthread+0x149/0x170\n[ 864.109022] ? set_kthread_struct+0x40/0x40\n[ 864.114713] ret_from_fork+0x22/0x30", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48694", url: "https://www.suse.com/security/cve/CVE-2022-48694", }, { category: "external", summary: "SUSE Bug 1223964 for CVE-2022-48694", url: "https://bugzilla.suse.com/1223964", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2022-48694", }, { cve: "CVE-2022-48695", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48695", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix use-after-free warning\n\nFix the following use-after-free warning which is observed during\ncontroller reset:\n\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 23 PID: 5399 at lib/refcount.c:28 refcount_warn_saturate+0xa6/0xf0", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48695", url: "https://www.suse.com/security/cve/CVE-2022-48695", }, { category: "external", summary: "SUSE Bug 1223941 for CVE-2022-48695", url: "https://bugzilla.suse.com/1223941", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2022-48695", }, { cve: "CVE-2022-48697", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48697", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix a use-after-free\n\nFix the following use-after-free complaint triggered by blktests nvme/004:\n\nBUG: KASAN: user-memory-access in blk_mq_complete_request_remote+0xac/0x350\nRead of size 4 at addr 0000607bd1835943 by task kworker/13:1/460\nWorkqueue: nvmet-wq nvme_loop_execute_work [nvme_loop]\nCall Trace:\n show_stack+0x52/0x58\n dump_stack_lvl+0x49/0x5e\n print_report.cold+0x36/0x1e2\n kasan_report+0xb9/0xf0\n __asan_load4+0x6b/0x80\n blk_mq_complete_request_remote+0xac/0x350\n nvme_loop_queue_response+0x1df/0x275 [nvme_loop]\n __nvmet_req_complete+0x132/0x4f0 [nvmet]\n nvmet_req_complete+0x15/0x40 [nvmet]\n nvmet_execute_io_connect+0x18a/0x1f0 [nvmet]\n nvme_loop_execute_work+0x20/0x30 [nvme_loop]\n process_one_work+0x56e/0xa70\n worker_thread+0x2d1/0x640\n kthread+0x183/0x1c0\n ret_from_fork+0x1f/0x30", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48697", url: "https://www.suse.com/security/cve/CVE-2022-48697", }, { category: "external", summary: "SUSE Bug 1223922 for CVE-2022-48697", url: "https://bugzilla.suse.com/1223922", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2022-48697", }, { cve: "CVE-2022-48699", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48699", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/debug: fix dentry leak in update_sched_domain_debugfs\n\nKuyo reports that the pattern of using debugfs_remove(debugfs_lookup())\nleaks a dentry and with a hotplug stress test, the machine eventually\nruns out of memory.\n\nFix this up by using the newly created debugfs_lookup_and_remove() call\ninstead which properly handles the dentry reference counting logic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48699", url: "https://www.suse.com/security/cve/CVE-2022-48699", }, { category: "external", summary: "SUSE Bug 1223996 for CVE-2022-48699", url: "https://bugzilla.suse.com/1223996", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2022-48699", }, { cve: "CVE-2022-48700", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48700", }, ], notes: [ { category: "general", text: "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48700", url: "https://www.suse.com/security/cve/CVE-2022-48700", }, { category: "external", summary: "SUSE Bug 1223957 for CVE-2022-48700", url: "https://bugzilla.suse.com/1223957", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "low", }, ], title: "CVE-2022-48700", }, { cve: "CVE-2022-48701", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48701", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface()\n\nThere may be a bad USB audio device with a USB ID of (0x04fa, 0x4201) and\nthe number of it's interfaces less than 4, an out-of-bounds read bug occurs\nwhen parsing the interface descriptor for this device.\n\nFix this by checking the number of interfaces.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48701", url: "https://www.suse.com/security/cve/CVE-2022-48701", }, { category: "external", summary: "SUSE Bug 1223921 for CVE-2022-48701", url: "https://bugzilla.suse.com/1223921", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "low", }, ], title: "CVE-2022-48701", }, { cve: "CVE-2022-48702", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48702", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc()\n\nThe voice allocator sometimes begins allocating from near the end of the\narray and then wraps around, however snd_emu10k1_pcm_channel_alloc()\naccesses the newly allocated voices as if it never wrapped around.\n\nThis results in out of bounds access if the first voice has a high enough\nindex so that first_voice + requested_voice_count > NUM_G (64).\nThe more voices are requested, the more likely it is for this to occur.\n\nThis was initially discovered using PipeWire, however it can be reproduced\nby calling aplay multiple times with 16 channels:\naplay -r 48000 -D plughw:CARD=Live,DEV=3 -c 16 /dev/zero\n\nUBSAN: array-index-out-of-bounds in sound/pci/emu10k1/emupcm.c:127:40\nindex 65 is out of range for type 'snd_emu10k1_voice [64]'\nCPU: 1 PID: 31977 Comm: aplay Tainted: G W IOE 6.0.0-rc2-emu10k1+ #7\nHardware name: ASUSTEK COMPUTER INC P5W DH Deluxe/P5W DH Deluxe, BIOS 3002 07/22/2010\nCall Trace:\n<TASK>\ndump_stack_lvl+0x49/0x63\ndump_stack+0x10/0x16\nubsan_epilogue+0x9/0x3f\n__ubsan_handle_out_of_bounds.cold+0x44/0x49\nsnd_emu10k1_playback_hw_params+0x3bc/0x420 [snd_emu10k1]\nsnd_pcm_hw_params+0x29f/0x600 [snd_pcm]\nsnd_pcm_common_ioctl+0x188/0x1410 [snd_pcm]\n? exit_to_user_mode_prepare+0x35/0x170\n? do_syscall_64+0x69/0x90\n? syscall_exit_to_user_mode+0x26/0x50\n? do_syscall_64+0x69/0x90\n? exit_to_user_mode_prepare+0x35/0x170\nsnd_pcm_ioctl+0x27/0x40 [snd_pcm]\n__x64_sys_ioctl+0x95/0xd0\ndo_syscall_64+0x5c/0x90\n? do_syscall_64+0x69/0x90\n? do_syscall_64+0x69/0x90\nentry_SYSCALL_64_after_hwframe+0x63/0xcd", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48702", url: "https://www.suse.com/security/cve/CVE-2022-48702", }, { category: "external", summary: "SUSE Bug 1223923 for CVE-2022-48702", url: "https://bugzilla.suse.com/1223923", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2022-48702", }, { cve: "CVE-2022-48703", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48703", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR\n\nIn some case, the GDDV returns a package with a buffer which has\nzero length. It causes that kmemdup() returns ZERO_SIZE_PTR (0x10).\n\nThen the data_vault_read() got NULL point dereference problem when\naccessing the 0x10 value in data_vault.\n\n[ 71.024560] BUG: kernel NULL pointer dereference, address:\n0000000000000010\n\nThis patch uses ZERO_OR_NULL_PTR() for checking ZERO_SIZE_PTR or\nNULL value in data_vault.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48703", url: "https://www.suse.com/security/cve/CVE-2022-48703", }, { category: "external", summary: "SUSE Bug 1223924 for CVE-2022-48703", url: "https://bugzilla.suse.com/1223924", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2022-48703", }, { cve: "CVE-2022-48704", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48704", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: add a force flush to delay work when radeon\n\nAlthough radeon card fence and wait for gpu to finish processing current batch rings,\nthere is still a corner case that radeon lockup work queue may not be fully flushed,\nand meanwhile the radeon_suspend_kms() function has called pci_set_power_state() to\nput device in D3hot state.\nPer PCI spec rev 4.0 on 5.3.1.4.1 D3hot State.\n> Configuration and Message requests are the only TLPs accepted by a Function in\n> the D3hot state. All other received Requests must be handled as Unsupported Requests,\n> and all received Completions may optionally be handled as Unexpected Completions.\nThis issue will happen in following logs:\nUnable to handle kernel paging request at virtual address 00008800e0008010\nCPU 0 kworker/0:3(131): Oops 0\npc = [<ffffffff811bea5c>] ra = [<ffffffff81240844>] ps = 0000 Tainted: G W\npc is at si_gpu_check_soft_reset+0x3c/0x240\nra is at si_dma_is_lockup+0x34/0xd0\nv0 = 0000000000000000 t0 = fff08800e0008010 t1 = 0000000000010000\nt2 = 0000000000008010 t3 = fff00007e3c00000 t4 = fff00007e3c00258\nt5 = 000000000000ffff t6 = 0000000000000001 t7 = fff00007ef078000\ns0 = fff00007e3c016e8 s1 = fff00007e3c00000 s2 = fff00007e3c00018\ns3 = fff00007e3c00000 s4 = fff00007fff59d80 s5 = 0000000000000000\ns6 = fff00007ef07bd98\na0 = fff00007e3c00000 a1 = fff00007e3c016e8 a2 = 0000000000000008\na3 = 0000000000000001 a4 = 8f5c28f5c28f5c29 a5 = ffffffff810f4338\nt8 = 0000000000000275 t9 = ffffffff809b66f8 t10 = ff6769c5d964b800\nt11= 000000000000b886 pv = ffffffff811bea20 at = 0000000000000000\ngp = ffffffff81d89690 sp = 00000000aa814126\nDisabling lock debugging due to kernel taint\nTrace:\n[<ffffffff81240844>] si_dma_is_lockup+0x34/0xd0\n[<ffffffff81119610>] radeon_fence_check_lockup+0xd0/0x290\n[<ffffffff80977010>] process_one_work+0x280/0x550\n[<ffffffff80977350>] worker_thread+0x70/0x7c0\n[<ffffffff80977410>] worker_thread+0x130/0x7c0\n[<ffffffff80982040>] kthread+0x200/0x210\n[<ffffffff809772e0>] worker_thread+0x0/0x7c0\n[<ffffffff80981f8c>] kthread+0x14c/0x210\n[<ffffffff80911658>] ret_from_kernel_thread+0x18/0x20\n[<ffffffff80981e40>] kthread+0x0/0x210\n Code: ad3e0008 43f0074a ad7e0018 ad9e0020 8c3001e8 40230101\n <88210000> 4821ed21\nSo force lockup work queue flush to fix this problem.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-48704", url: "https://www.suse.com/security/cve/CVE-2022-48704", }, { category: "external", summary: "SUSE Bug 1223932 for CVE-2022-48704", url: "https://bugzilla.suse.com/1223932", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2022-48704", }, { cve: "CVE-2022-49035", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-49035", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE\n\nI expect that the hardware will have limited this to 16, but just in\ncase it hasn't, check for this corner case.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-49035", url: "https://www.suse.com/security/cve/CVE-2022-49035", }, { category: "external", summary: "SUSE Bug 1215304 for CVE-2022-49035", url: "https://bugzilla.suse.com/1215304", }, { category: "external", summary: "SUSE Bug 1235013 for CVE-2022-49035", url: "https://bugzilla.suse.com/1235013", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "important", }, ], title: "CVE-2022-49035", }, { cve: "CVE-2023-0160", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-0160", }, ], notes: [ { category: "general", text: "A deadlock flaw was found in the Linux kernel's BPF subsystem. This flaw allows a local user to potentially crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-0160", url: "https://www.suse.com/security/cve/CVE-2023-0160", }, { category: "external", summary: "SUSE Bug 1209657 for CVE-2023-0160", url: "https://bugzilla.suse.com/1209657", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2023-0160", }, { cve: "CVE-2023-2860", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2860", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. The flaw exists within the processing of seg6 attributes. The issue results from the improper validation of user-supplied data, which can result in a read past the end of an allocated buffer. This flaw allows a privileged local user to disclose sensitive information on affected installations of the Linux kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-2860", url: "https://www.suse.com/security/cve/CVE-2023-2860", }, { category: "external", summary: "SUSE Bug 1211592 for CVE-2023-2860", url: "https://bugzilla.suse.com/1211592", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2023-2860", }, { cve: "CVE-2023-47233", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-47233", }, ], notes: [ { category: "general", text: "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-47233", url: "https://www.suse.com/security/cve/CVE-2023-47233", }, { category: "external", summary: "SUSE Bug 1216702 for CVE-2023-47233", url: "https://bugzilla.suse.com/1216702", }, { category: "external", summary: "SUSE Bug 1224592 for CVE-2023-47233", url: "https://bugzilla.suse.com/1224592", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2023-47233", }, { cve: "CVE-2023-52591", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52591", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nreiserfs: Avoid touching renamed directory if parent does not change\n\nThe VFS will not be locking moved directory if its parent does not\nchange. Change reiserfs rename code to avoid touching renamed directory\nif its parent does not change as without locking that can corrupt the\nfilesystem.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-52591", url: "https://www.suse.com/security/cve/CVE-2023-52591", }, { category: "external", summary: "SUSE Bug 1221044 for CVE-2023-52591", url: "https://bugzilla.suse.com/1221044", }, { category: "external", summary: "SUSE Bug 1221578 for CVE-2023-52591", url: "https://bugzilla.suse.com/1221578", }, { category: "external", summary: "SUSE Bug 1221598 for CVE-2023-52591", url: "https://bugzilla.suse.com/1221598", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "important", }, ], title: "CVE-2023-52591", }, { cve: "CVE-2023-52654", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52654", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/af_unix: disable sending io_uring over sockets\n\nFile reference cycles have caused lots of problems for io_uring\nin the past, and it still doesn't work exactly right and races with\nunix_stream_read_generic(). The safest fix would be to completely\ndisallow sending io_uring files via sockets via SCM_RIGHT, so there\nare no possible cycles invloving registered files and thus rendering\nSCM accounting on the io_uring side unnecessary.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-52654", url: "https://www.suse.com/security/cve/CVE-2023-52654", }, { category: "external", summary: "SUSE Bug 1224099 for CVE-2023-52654", url: "https://bugzilla.suse.com/1224099", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2023-52654", }, { cve: "CVE-2023-52655", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52655", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: aqc111: check packet for fixup for true limit\n\nIf a device sends a packet that is inbetween 0\nand sizeof(u64) the value passed to skb_trim()\nas length will wrap around ending up as some very\nlarge value.\n\nThe driver will then proceed to parse the header\nlocated at that position, which will either oops or\nprocess some random value.\n\nThe fix is to check against sizeof(u64) rather than\n0, which the driver currently does. The issue exists\nsince the introduction of the driver.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-52655", url: "https://www.suse.com/security/cve/CVE-2023-52655", }, { category: "external", summary: "SUSE Bug 1217169 for CVE-2023-52655", url: "https://bugzilla.suse.com/1217169", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2023-52655", }, { cve: "CVE-2023-52676", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52676", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Guard stack limits against 32bit overflow\n\nThis patch promotes the arithmetic around checking stack bounds to be\ndone in the 64-bit domain, instead of the current 32bit. The arithmetic\nimplies adding together a 64-bit register with a int offset. The\nregister was checked to be below 1<<29 when it was variable, but not\nwhen it was fixed. The offset either comes from an instruction (in which\ncase it is 16 bit), from another register (in which case the caller\nchecked it to be below 1<<29 [1]), or from the size of an argument to a\nkfunc (in which case it can be a u32 [2]). Between the register being\ninconsistently checked to be below 1<<29, and the offset being up to an\nu32, it appears that we were open to overflowing the `int`s which were\ncurrently used for arithmetic.\n\n[1] https://github.com/torvalds/linux/blob/815fb87b753055df2d9e50f6cd80eb10235fe3e9/kernel/bpf/verifier.c#L7494-L7498\n[2] https://github.com/torvalds/linux/blob/815fb87b753055df2d9e50f6cd80eb10235fe3e9/kernel/bpf/verifier.c#L11904", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-52676", url: "https://www.suse.com/security/cve/CVE-2023-52676", }, { category: "external", summary: "SUSE Bug 1224730 for CVE-2023-52676", url: "https://bugzilla.suse.com/1224730", }, { category: "external", summary: "SUSE Bug 1226336 for CVE-2023-52676", url: "https://bugzilla.suse.com/1226336", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "important", }, ], title: "CVE-2023-52676", }, { cve: "CVE-2023-6531", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6531", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the Linux Kernel due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2023-6531", url: "https://www.suse.com/security/cve/CVE-2023-6531", }, { category: "external", summary: "SUSE Bug 1218447 for CVE-2023-6531", url: "https://bugzilla.suse.com/1218447", }, { category: "external", summary: "SUSE Bug 1218487 for CVE-2023-6531", url: "https://bugzilla.suse.com/1218487", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2023-6531", }, { cve: "CVE-2024-26764", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26764", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio\n\nIf kiocb_set_cancel_fn() is called for I/O submitted via io_uring, the\nfollowing kernel warning appears:\n\nWARNING: CPU: 3 PID: 368 at fs/aio.c:598 kiocb_set_cancel_fn+0x9c/0xa8\nCall trace:\n kiocb_set_cancel_fn+0x9c/0xa8\n ffs_epfile_read_iter+0x144/0x1d0\n io_read+0x19c/0x498\n io_issue_sqe+0x118/0x27c\n io_submit_sqes+0x25c/0x5fc\n __arm64_sys_io_uring_enter+0x104/0xab0\n invoke_syscall+0x58/0x11c\n el0_svc_common+0xb4/0xf4\n do_el0_svc+0x2c/0xb0\n el0_svc+0x2c/0xa4\n el0t_64_sync_handler+0x68/0xb4\n el0t_64_sync+0x1a4/0x1a8\n\nFix this by setting the IOCB_AIO_RW flag for read and write I/O that is\nsubmitted by libaio.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-26764", url: "https://www.suse.com/security/cve/CVE-2024-26764", }, { category: "external", summary: "SUSE Bug 1222721 for CVE-2024-26764", url: "https://bugzilla.suse.com/1222721", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "low", }, ], title: "CVE-2024-26764", }, { cve: "CVE-2024-35811", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35811", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach\n\nThis is the candidate patch of CVE-2023-47233 :\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-47233\n\nIn brcm80211 driver,it starts with the following invoking chain\nto start init a timeout worker:\n\n->brcmf_usb_probe\n ->brcmf_usb_probe_cb\n ->brcmf_attach\n ->brcmf_bus_started\n ->brcmf_cfg80211_attach\n ->wl_init_priv\n ->brcmf_init_escan\n ->INIT_WORK(&cfg->escan_timeout_work,\n\t\t brcmf_cfg80211_escan_timeout_worker);\n\nIf we disconnect the USB by hotplug, it will call\nbrcmf_usb_disconnect to make cleanup. The invoking chain is :\n\nbrcmf_usb_disconnect\n ->brcmf_usb_disconnect_cb\n ->brcmf_detach\n ->brcmf_cfg80211_detach\n ->kfree(cfg);\n\nWhile the timeout woker may still be running. This will cause\na use-after-free bug on cfg in brcmf_cfg80211_escan_timeout_worker.\n\nFix it by deleting the timer and canceling the worker in\nbrcmf_cfg80211_detach.\n\n[arend.vanspriel@broadcom.com: keep timer delete as is and cancel work just before free]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-35811", url: "https://www.suse.com/security/cve/CVE-2024-35811", }, { category: "external", summary: "SUSE Bug 1224592 for CVE-2024-35811", url: "https://bugzilla.suse.com/1224592", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2024-35811", }, { cve: "CVE-2024-35815", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35815", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion\n\nThe first kiocb_set_cancel_fn() argument may point at a struct kiocb\nthat is not embedded inside struct aio_kiocb. With the current code,\ndepending on the compiler, the req->ki_ctx read happens either before\nthe IOCB_AIO_RW test or after that test. Move the req->ki_ctx read such\nthat it is guaranteed that the IOCB_AIO_RW test happens first.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-35815", url: "https://www.suse.com/security/cve/CVE-2024-35815", }, { category: "external", summary: "SUSE Bug 1224685 for CVE-2024-35815", url: "https://bugzilla.suse.com/1224685", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2024-35815", }, { cve: "CVE-2024-35895", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35895", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Prevent lock inversion deadlock in map delete elem\n\nsyzkaller started using corpuses where a BPF tracing program deletes\nelements from a sockmap/sockhash map. Because BPF tracing programs can be\ninvoked from any interrupt context, locks taken during a map_delete_elem\noperation must be hardirq-safe. Otherwise a deadlock due to lock inversion\nis possible, as reported by lockdep:\n\n CPU0 CPU1\n ---- ----\n lock(&htab->buckets[i].lock);\n local_irq_disable();\n lock(&host->lock);\n lock(&htab->buckets[i].lock);\n <Interrupt>\n lock(&host->lock);\n\nLocks in sockmap are hardirq-unsafe by design. We expects elements to be\ndeleted from sockmap/sockhash only in task (normal) context with interrupts\nenabled, or in softirq context.\n\nDetect when map_delete_elem operation is invoked from a context which is\n_not_ hardirq-unsafe, that is interrupts are disabled, and bail out with an\nerror.\n\nNote that map updates are not affected by this issue. BPF verifier does not\nallow updating sockmap/sockhash from a BPF tracing program today.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-35895", url: "https://www.suse.com/security/cve/CVE-2024-35895", }, { category: "external", summary: "SUSE Bug 1224511 for CVE-2024-35895", url: "https://bugzilla.suse.com/1224511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2024-35895", }, { cve: "CVE-2024-35914", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35914", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: Fix error cleanup path in nfsd_rename()\n\nCommit a8b0026847b8 (\"rename(): avoid a deadlock in the case of parents\nhaving no common ancestor\") added an error bail out path. However this\npath does not drop the remount protection that has been acquired. Fix\nthe cleanup path to properly drop the remount protection.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-35914", url: "https://www.suse.com/security/cve/CVE-2024-35914", }, { category: "external", summary: "SUSE Bug 1224482 for CVE-2024-35914", url: "https://bugzilla.suse.com/1224482", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2024-35914", }, { cve: "CVE-2024-50154", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-50154", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().\n\nMartin KaFai Lau reported use-after-free [0] in reqsk_timer_handler().\n\n \"\"\"\n We are seeing a use-after-free from a bpf prog attached to\n trace_tcp_retransmit_synack. The program passes the req->sk to the\n bpf_sk_storage_get_tracing kernel helper which does check for null\n before using it.\n \"\"\"\n\nThe commit 83fccfc3940c (\"inet: fix potential deadlock in\nreqsk_queue_unlink()\") added timer_pending() in reqsk_queue_unlink() not\nto call del_timer_sync() from reqsk_timer_handler(), but it introduced a\nsmall race window.\n\nBefore the timer is called, expire_timers() calls detach_timer(timer, true)\nto clear timer->entry.pprev and marks it as not pending.\n\nIf reqsk_queue_unlink() checks timer_pending() just after expire_timers()\ncalls detach_timer(), TCP will miss del_timer_sync(); the reqsk timer will\ncontinue running and send multiple SYN+ACKs until it expires.\n\nThe reported UAF could happen if req->sk is close()d earlier than the timer\nexpiration, which is 63s by default.\n\nThe scenario would be\n\n 1. inet_csk_complete_hashdance() calls inet_csk_reqsk_queue_drop(),\n but del_timer_sync() is missed\n\n 2. reqsk timer is executed and scheduled again\n\n 3. req->sk is accept()ed and reqsk_put() decrements rsk_refcnt, but\n reqsk timer still has another one, and inet_csk_accept() does not\n clear req->sk for non-TFO sockets\n\n 4. sk is close()d\n\n 5. reqsk timer is executed again, and BPF touches req->sk\n\nLet's not use timer_pending() by passing the caller context to\n__inet_csk_reqsk_queue_drop().\n\nNote that reqsk timer is pinned, so the issue does not happen in most\nuse cases. [1]\n\n[0]\nBUG: KFENCE: use-after-free read in bpf_sk_storage_get_tracing+0x2e/0x1b0\n\nUse-after-free read at 0x00000000a891fb3a (in kfence-#1):\nbpf_sk_storage_get_tracing+0x2e/0x1b0\nbpf_prog_5ea3e95db6da0438_tcp_retransmit_synack+0x1d20/0x1dda\nbpf_trace_run2+0x4c/0xc0\ntcp_rtx_synack+0xf9/0x100\nreqsk_timer_handler+0xda/0x3d0\nrun_timer_softirq+0x292/0x8a0\nirq_exit_rcu+0xf5/0x320\nsysvec_apic_timer_interrupt+0x6d/0x80\nasm_sysvec_apic_timer_interrupt+0x16/0x20\nintel_idle_irq+0x5a/0xa0\ncpuidle_enter_state+0x94/0x273\ncpu_startup_entry+0x15e/0x260\nstart_secondary+0x8a/0x90\nsecondary_startup_64_no_verify+0xfa/0xfb\n\nkfence-#1: 0x00000000a72cc7b6-0x00000000d97616d9, size=2376, cache=TCPv6\n\nallocated by task 0 on cpu 9 at 260507.901592s:\nsk_prot_alloc+0x35/0x140\nsk_clone_lock+0x1f/0x3f0\ninet_csk_clone_lock+0x15/0x160\ntcp_create_openreq_child+0x1f/0x410\ntcp_v6_syn_recv_sock+0x1da/0x700\ntcp_check_req+0x1fb/0x510\ntcp_v6_rcv+0x98b/0x1420\nipv6_list_rcv+0x2258/0x26e0\nnapi_complete_done+0x5b1/0x2990\nmlx5e_napi_poll+0x2ae/0x8d0\nnet_rx_action+0x13e/0x590\nirq_exit_rcu+0xf5/0x320\ncommon_interrupt+0x80/0x90\nasm_common_interrupt+0x22/0x40\ncpuidle_enter_state+0xfb/0x273\ncpu_startup_entry+0x15e/0x260\nstart_secondary+0x8a/0x90\nsecondary_startup_64_no_verify+0xfa/0xfb\n\nfreed by task 0 on cpu 9 at 260507.927527s:\nrcu_core_si+0x4ff/0xf10\nirq_exit_rcu+0xf5/0x320\nsysvec_apic_timer_interrupt+0x6d/0x80\nasm_sysvec_apic_timer_interrupt+0x16/0x20\ncpuidle_enter_state+0xfb/0x273\ncpu_startup_entry+0x15e/0x260\nstart_secondary+0x8a/0x90\nsecondary_startup_64_no_verify+0xfa/0xfb", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-50154", url: "https://www.suse.com/security/cve/CVE-2024-50154", }, { category: "external", summary: "SUSE Bug 1233070 for CVE-2024-50154", url: "https://bugzilla.suse.com/1233070", }, { category: "external", summary: "SUSE Bug 1233072 for CVE-2024-50154", url: "https://bugzilla.suse.com/1233072", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "important", }, ], title: "CVE-2024-50154", }, { cve: "CVE-2024-53095", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53095", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix use-after-free of network namespace.\n\nRecently, we got a customer report that CIFS triggers oops while\nreconnecting to a server. [0]\n\nThe workload runs on Kubernetes, and some pods mount CIFS servers\nin non-root network namespaces. The problem rarely happened, but\nit was always while the pod was dying.\n\nThe root cause is wrong reference counting for network namespace.\n\nCIFS uses kernel sockets, which do not hold refcnt of the netns that\nthe socket belongs to. That means CIFS must ensure the socket is\nalways freed before its netns; otherwise, use-after-free happens.\n\nThe repro steps are roughly:\n\n 1. mount CIFS in a non-root netns\n 2. drop packets from the netns\n 3. destroy the netns\n 4. unmount CIFS\n\nWe can reproduce the issue quickly with the script [1] below and see\nthe splat [2] if CONFIG_NET_NS_REFCNT_TRACKER is enabled.\n\nWhen the socket is TCP, it is hard to guarantee the netns lifetime\nwithout holding refcnt due to async timers.\n\nLet's hold netns refcnt for each socket as done for SMC in commit\n9744d2bf1976 (\"smc: Fix use-after-free in tcp_write_timer_handler().\").\n\nNote that we need to move put_net() from cifs_put_tcp_session() to\nclean_demultiplex_info(); otherwise, __sock_create() still could touch a\nfreed netns while cifsd tries to reconnect from cifs_demultiplex_thread().\n\nAlso, maybe_get_net() cannot be put just before __sock_create() because\nthe code is not under RCU and there is a small chance that the same\naddress happened to be reallocated to another netns.\n\n[0]:\nCIFS: VFS: \\\\XXXXXXXXXXX has not responded in 15 seconds. Reconnecting...\nCIFS: Serverclose failed 4 times, giving up\nUnable to handle kernel paging request at virtual address 14de99e461f84a07\nMem abort info:\n ESR = 0x0000000096000004\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x04: level 0 translation fault\nData abort info:\n ISV = 0, ISS = 0x00000004\n CM = 0, WnR = 0\n[14de99e461f84a07] address between user and kernel address ranges\nInternal error: Oops: 0000000096000004 [#1] SMP\nModules linked in: cls_bpf sch_ingress nls_utf8 cifs cifs_arc4 cifs_md4 dns_resolver tcp_diag inet_diag veth xt_state xt_connmark nf_conntrack_netlink xt_nat xt_statistic xt_MASQUERADE xt_mark xt_addrtype ipt_REJECT nf_reject_ipv4 nft_chain_nat nf_nat xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_comment nft_compat nf_tables nfnetlink overlay nls_ascii nls_cp437 sunrpc vfat fat aes_ce_blk aes_ce_cipher ghash_ce sm4_ce_cipher sm4 sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 sha1_ce ena button sch_fq_codel loop fuse configfs dmi_sysfs sha2_ce sha256_arm64 dm_mirror dm_region_hash dm_log dm_mod dax efivarfs\nCPU: 5 PID: 2690970 Comm: cifsd Not tainted 6.1.103-109.184.amzn2023.aarch64 #1\nHardware name: Amazon EC2 r7g.4xlarge/, BIOS 1.0 11/1/2018\npstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : fib_rules_lookup+0x44/0x238\nlr : __fib_lookup+0x64/0xbc\nsp : ffff8000265db790\nx29: ffff8000265db790 x28: 0000000000000000 x27: 000000000000bd01\nx26: 0000000000000000 x25: ffff000b4baf8000 x24: ffff00047b5e4580\nx23: ffff8000265db7e0 x22: 0000000000000000 x21: ffff00047b5e4500\nx20: ffff0010e3f694f8 x19: 14de99e461f849f7 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 3f92800abd010002\nx11: 0000000000000001 x10: ffff0010e3f69420 x9 : ffff800008a6f294\nx8 : 0000000000000000 x7 : 0000000000000006 x6 : 0000000000000000\nx5 : 0000000000000001 x4 : ffff001924354280 x3 : ffff8000265db7e0\nx2 : 0000000000000000 x1 : ffff0010e3f694f8 x0 : ffff00047b5e4500\nCall trace:\n fib_rules_lookup+0x44/0x238\n __fib_lookup+0x64/0xbc\n ip_route_output_key_hash_rcu+0x2c4/0x398\n ip_route_output_key_hash+0x60/0x8c\n tcp_v4_connect+0x290/0x488\n __inet_stream_connect+0x108/0x3d0\n inet_stream_connect+0x50/0x78\n kernel_connect+0x6c/0xac\n generic_ip_conne\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-53095", url: "https://www.suse.com/security/cve/CVE-2024-53095", }, { category: "external", summary: "SUSE Bug 1233642 for CVE-2024-53095", url: "https://bugzilla.suse.com/1233642", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2024-53095", }, { cve: "CVE-2024-53142", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53142", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ninitramfs: avoid filename buffer overrun\n\nThe initramfs filename field is defined in\nDocumentation/driver-api/early-userspace/buffer-format.rst as:\n\n 37 cpio_file := ALGN(4) + cpio_header + filename + \"\\0\" + ALGN(4) + data\n...\n 55 ============= ================== =========================\n 56 Field name Field size Meaning\n 57 ============= ================== =========================\n...\n 70 c_namesize 8 bytes Length of filename, including final \\0\n\nWhen extracting an initramfs cpio archive, the kernel's do_name() path\nhandler assumes a zero-terminated path at @collected, passing it\ndirectly to filp_open() / init_mkdir() / init_mknod().\n\nIf a specially crafted cpio entry carries a non-zero-terminated filename\nand is followed by uninitialized memory, then a file may be created with\ntrailing characters that represent the uninitialized memory. The ability\nto create an initramfs entry would imply already having full control of\nthe system, so the buffer overrun shouldn't be considered a security\nvulnerability.\n\nAppend the output of the following bash script to an existing initramfs\nand observe any created /initramfs_test_fname_overrunAA* path. E.g.\n ./reproducer.sh | gzip >> /myinitramfs\n\nIt's easiest to observe non-zero uninitialized memory when the output is\ngzipped, as it'll overflow the heap allocated @out_buf in __gunzip(),\nrather than the initrd_start+initrd_size block.\n\n---- reproducer.sh ----\nnilchar=\"A\"\t# change to \"\\0\" to properly zero terminate / pad\nmagic=\"070701\"\nino=1\nmode=$(( 0100777 ))\nuid=0\ngid=0\nnlink=1\nmtime=1\nfilesize=0\ndevmajor=0\ndevminor=1\nrdevmajor=0\nrdevminor=0\ncsum=0\nfname=\"initramfs_test_fname_overrun\"\nnamelen=$(( ${#fname} + 1 ))\t# plus one to account for terminator\n\nprintf \"%s%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%s\" \\\n\t$magic $ino $mode $uid $gid $nlink $mtime $filesize \\\n\t$devmajor $devminor $rdevmajor $rdevminor $namelen $csum $fname\n\ntermpadlen=$(( 1 + ((4 - ((110 + $namelen) & 3)) % 4) ))\nprintf \"%.s${nilchar}\" $(seq 1 $termpadlen)\n---- reproducer.sh ----\n\nSymlink filename fields handled in do_symlink() won't overrun past the\ndata segment, due to the explicit zero-termination of the symlink\ntarget.\n\nFix filename buffer overrun by aborting the initramfs FSM if any cpio\nentry doesn't carry a zero-terminator at the expected (name_len - 1)\noffset.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-53142", url: "https://www.suse.com/security/cve/CVE-2024-53142", }, { category: "external", summary: "SUSE Bug 1232436 for CVE-2024-53142", url: "https://bugzilla.suse.com/1232436", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2024-53142", }, { cve: "CVE-2024-53146", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53146", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Prevent a potential integer overflow\n\nIf the tag length is >= U32_MAX - 3 then the \"length + 4\" addition\ncan result in an integer overflow. Address this by splitting the\ndecoding into several steps so that decode_cb_compound4res() does\nnot have to perform arithmetic on the unsafe length value.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-53146", url: "https://www.suse.com/security/cve/CVE-2024-53146", }, { category: "external", summary: "SUSE Bug 1234853 for CVE-2024-53146", url: "https://bugzilla.suse.com/1234853", }, { category: "external", summary: "SUSE Bug 1234854 for CVE-2024-53146", url: "https://bugzilla.suse.com/1234854", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "important", }, ], title: "CVE-2024-53146", }, { cve: "CVE-2024-53156", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53156", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()\n\nI found the following bug in my fuzzer:\n\n UBSAN: array-index-out-of-bounds in drivers/net/wireless/ath/ath9k/htc_hst.c:26:51\n index 255 is out of range for type 'htc_endpoint [22]'\n CPU: 0 UID: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.11.0-rc6-dirty #14\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n Workqueue: events request_firmware_work_func\n Call Trace:\n <TASK>\n dump_stack_lvl+0x180/0x1b0\n __ubsan_handle_out_of_bounds+0xd4/0x130\n htc_issue_send.constprop.0+0x20c/0x230\n ? _raw_spin_unlock_irqrestore+0x3c/0x70\n ath9k_wmi_cmd+0x41d/0x610\n ? mark_held_locks+0x9f/0xe0\n ...\n\nSince this bug has been confirmed to be caused by insufficient verification\nof conn_rsp_epid, I think it would be appropriate to add a range check for\nconn_rsp_epid to htc_connect_service() to prevent the bug from occurring.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-53156", url: "https://www.suse.com/security/cve/CVE-2024-53156", }, { category: "external", summary: "SUSE Bug 1234846 for CVE-2024-53156", url: "https://bugzilla.suse.com/1234846", }, { category: "external", summary: "SUSE Bug 1234847 for CVE-2024-53156", url: "https://bugzilla.suse.com/1234847", }, { category: "external", summary: "SUSE Bug 1234853 for CVE-2024-53156", url: "https://bugzilla.suse.com/1234853", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "important", }, ], title: "CVE-2024-53156", }, { cve: "CVE-2024-53173", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53173", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4.0: Fix a use-after-free problem in the asynchronous open()\n\nYang Erkun reports that when two threads are opening files at the same\ntime, and are forced to abort before a reply is seen, then the call to\nnfs_release_seqid() in nfs4_opendata_free() can result in a\nuse-after-free of the pointer to the defunct rpc task of the other\nthread.\nThe fix is to ensure that if the RPC call is aborted before the call to\nnfs_wait_on_sequence() is complete, then we must call nfs_release_seqid()\nin nfs4_open_release() before the rpc_task is freed.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-53173", url: "https://www.suse.com/security/cve/CVE-2024-53173", }, { category: "external", summary: "SUSE Bug 1234853 for CVE-2024-53173", url: "https://bugzilla.suse.com/1234853", }, { category: "external", summary: "SUSE Bug 1234891 for CVE-2024-53173", url: "https://bugzilla.suse.com/1234891", }, { category: "external", summary: "SUSE Bug 1234892 for CVE-2024-53173", url: "https://bugzilla.suse.com/1234892", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "important", }, ], title: "CVE-2024-53173", }, { cve: "CVE-2024-53179", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53179", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix use-after-free of signing key\n\nCustomers have reported use-after-free in @ses->auth_key.response with\nSMB2.1 + sign mounts which occurs due to following race:\n\ntask A task B\ncifs_mount()\n dfs_mount_share()\n get_session()\n cifs_mount_get_session() cifs_send_recv()\n cifs_get_smb_ses() compound_send_recv()\n cifs_setup_session() smb2_setup_request()\n kfree_sensitive() smb2_calc_signature()\n crypto_shash_setkey() *UAF*\n\nFix this by ensuring that we have a valid @ses->auth_key.response by\nchecking whether @ses->ses_status is SES_GOOD or SES_EXITING with\n@ses->ses_lock held. After commit 24a9799aa8ef (\"smb: client: fix UAF\nin smb2_reconnect_server()\"), we made sure to call ->logoff() only\nwhen @ses was known to be good (e.g. valid ->auth_key.response), so\nit's safe to access signing key when @ses->ses_status == SES_EXITING.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-53179", url: "https://www.suse.com/security/cve/CVE-2024-53179", }, { category: "external", summary: "SUSE Bug 1234921 for CVE-2024-53179", url: "https://bugzilla.suse.com/1234921", }, { category: "external", summary: "SUSE Bug 1234927 for CVE-2024-53179", url: "https://bugzilla.suse.com/1234927", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "important", }, ], title: "CVE-2024-53179", }, { cve: "CVE-2024-53206", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53206", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Fix use-after-free of nreq in reqsk_timer_handler().\n\nThe cited commit replaced inet_csk_reqsk_queue_drop_and_put() with\n__inet_csk_reqsk_queue_drop() and reqsk_put() in reqsk_timer_handler().\n\nThen, oreq should be passed to reqsk_put() instead of req; otherwise\nuse-after-free of nreq could happen when reqsk is migrated but the\nretry attempt failed (e.g. due to timeout).\n\nLet's pass oreq to reqsk_put().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-53206", url: "https://www.suse.com/security/cve/CVE-2024-53206", }, { category: "external", summary: "SUSE Bug 1234960 for CVE-2024-53206", url: "https://bugzilla.suse.com/1234960", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2024-53206", }, { cve: "CVE-2024-53214", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53214", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Properly hide first-in-list PCIe extended capability\n\nThere are cases where a PCIe extended capability should be hidden from\nthe user. For example, an unknown capability (i.e., capability with ID\ngreater than PCI_EXT_CAP_ID_MAX) or a capability that is intentionally\nchosen to be hidden from the user.\n\nHiding a capability is done by virtualizing and modifying the 'Next\nCapability Offset' field of the previous capability so it points to the\ncapability after the one that should be hidden.\n\nThe special case where the first capability in the list should be hidden\nis handled differently because there is no previous capability that can\nbe modified. In this case, the capability ID and version are zeroed\nwhile leaving the next pointer intact. This hides the capability and\nleaves an anchor for the rest of the capability list.\n\nHowever, today, hiding the first capability in the list is not done\nproperly if the capability is unknown, as struct\nvfio_pci_core_device->pci_config_map is set to the capability ID during\ninitialization but the capability ID is not properly checked later when\nused in vfio_config_do_rw(). This leads to the following warning [1] and\nto an out-of-bounds access to ecap_perms array.\n\nFix it by checking cap_id in vfio_config_do_rw(), and if it is greater\nthan PCI_EXT_CAP_ID_MAX, use an alternative struct perm_bits for direct\nread only access instead of the ecap_perms array.\n\nNote that this is safe since the above is the only case where cap_id can\nexceed PCI_EXT_CAP_ID_MAX (except for the special capabilities, which\nare already checked before).\n\n[1]\n\nWARNING: CPU: 118 PID: 5329 at drivers/vfio/pci/vfio_pci_config.c:1900 vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\nCPU: 118 UID: 0 PID: 5329 Comm: simx-qemu-syste Not tainted 6.12.0+ #1\n(snip)\nCall Trace:\n <TASK>\n ? show_regs+0x69/0x80\n ? __warn+0x8d/0x140\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? report_bug+0x18f/0x1a0\n ? handle_bug+0x63/0xa0\n ? exc_invalid_op+0x19/0x70\n ? asm_exc_invalid_op+0x1b/0x20\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? vfio_pci_config_rw+0x244/0x430 [vfio_pci_core]\n vfio_pci_rw+0x101/0x1b0 [vfio_pci_core]\n vfio_pci_core_read+0x1d/0x30 [vfio_pci_core]\n vfio_device_fops_read+0x27/0x40 [vfio]\n vfs_read+0xbd/0x340\n ? vfio_device_fops_unl_ioctl+0xbb/0x740 [vfio]\n ? __rseq_handle_notify_resume+0xa4/0x4b0\n __x64_sys_pread64+0x96/0xc0\n x64_sys_call+0x1c3d/0x20d0\n do_syscall_64+0x4d/0x120\n entry_SYSCALL_64_after_hwframe+0x76/0x7e", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-53214", url: "https://www.suse.com/security/cve/CVE-2024-53214", }, { category: "external", summary: "SUSE Bug 1235004 for CVE-2024-53214", url: "https://bugzilla.suse.com/1235004", }, { category: "external", summary: "SUSE Bug 1235005 for CVE-2024-53214", url: "https://bugzilla.suse.com/1235005", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "important", }, ], title: "CVE-2024-53214", }, { cve: "CVE-2024-53239", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53239", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: 6fire: Release resources at card release\n\nThe current 6fire code tries to release the resources right after the\ncall of usb6fire_chip_abort(). But at this moment, the card object\nmight be still in use (as we're calling snd_card_free_when_closed()).\n\nFor avoid potential UAFs, move the release of resources to the card's\nprivate_free instead of the manual call of usb6fire_chip_destroy() at\nthe USB disconnect callback.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-53239", url: "https://www.suse.com/security/cve/CVE-2024-53239", }, { category: "external", summary: "SUSE Bug 1234853 for CVE-2024-53239", url: "https://bugzilla.suse.com/1234853", }, { category: "external", summary: "SUSE Bug 1235054 for CVE-2024-53239", url: "https://bugzilla.suse.com/1235054", }, { category: "external", summary: "SUSE Bug 1235055 for CVE-2024-53239", url: "https://bugzilla.suse.com/1235055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "important", }, ], title: "CVE-2024-53239", }, { cve: "CVE-2024-53240", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53240", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/netfront: fix crash when removing device\n\nWhen removing a netfront device directly after a suspend/resume cycle\nit might happen that the queues have not been setup again, causing a\ncrash during the attempt to stop the queues another time.\n\nFix that by checking the queues are existing before trying to stop\nthem.\n\nThis is XSA-465 / CVE-2024-53240.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-53240", url: "https://www.suse.com/security/cve/CVE-2024-53240", }, { category: "external", summary: "SUSE Bug 1234281 for CVE-2024-53240", url: "https://bugzilla.suse.com/1234281", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2024-53240", }, { cve: "CVE-2024-53241", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53241", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/xen: don't do PV iret hypercall through hypercall page\n\nInstead of jumping to the Xen hypercall page for doing the iret\nhypercall, directly code the required sequence in xen-asm.S.\n\nThis is done in preparation of no longer using hypercall page at all,\nas it has shown to cause problems with speculation mitigations.\n\nThis is part of XSA-466 / CVE-2024-53241.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-53241", url: "https://www.suse.com/security/cve/CVE-2024-53241", }, { category: "external", summary: "SUSE Bug 1234282 for CVE-2024-53241", url: "https://bugzilla.suse.com/1234282", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2024-53241", }, { cve: "CVE-2024-56539", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56539", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan()\n\nReplace one-element array with a flexible-array member in `struct\nmwifiex_ie_types_wildcard_ssid_params` to fix the following warning\non a MT8173 Chromebook (mt8173-elm-hana):\n\n[ 356.775250] ------------[ cut here ]------------\n[ 356.784543] memcpy: detected field-spanning write (size 6) of single field \"wildcard_ssid_tlv->ssid\" at drivers/net/wireless/marvell/mwifiex/scan.c:904 (size 1)\n[ 356.813403] WARNING: CPU: 3 PID: 742 at drivers/net/wireless/marvell/mwifiex/scan.c:904 mwifiex_scan_networks+0x4fc/0xf28 [mwifiex]\n\nThe \"(size 6)\" above is exactly the length of the SSID of the network\nthis device was connected to. The source of the warning looks like:\n\n ssid_len = user_scan_in->ssid_list[i].ssid_len;\n [...]\n memcpy(wildcard_ssid_tlv->ssid,\n user_scan_in->ssid_list[i].ssid, ssid_len);\n\nThere is a #define WILDCARD_SSID_TLV_MAX_SIZE that uses sizeof() on this\nstruct, but it already didn't account for the size of the one-element\narray, so it doesn't need to be changed.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-56539", url: "https://www.suse.com/security/cve/CVE-2024-56539", }, { category: "external", summary: "SUSE Bug 1234853 for CVE-2024-56539", url: "https://bugzilla.suse.com/1234853", }, { category: "external", summary: "SUSE Bug 1234963 for CVE-2024-56539", url: "https://bugzilla.suse.com/1234963", }, { category: "external", summary: "SUSE Bug 1234964 for CVE-2024-56539", url: "https://bugzilla.suse.com/1234964", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "important", }, ], title: "CVE-2024-56539", }, { cve: "CVE-2024-56548", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56548", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: don't query the device logical block size multiple times\n\nDevices block sizes may change. One of these cases is a loop device by\nusing ioctl LOOP_SET_BLOCK_SIZE.\n\nWhile this may cause other issues like IO being rejected, in the case of\nhfsplus, it will allocate a block by using that size and potentially write\nout-of-bounds when hfsplus_read_wrapper calls hfsplus_submit_bio and the\nlatter function reads a different io_size.\n\nUsing a new min_io_size initally set to sb_min_blocksize works for the\npurposes of the original fix, since it will be set to the max between\nHFSPLUS_SECTOR_SIZE and the first seen logical block size. We still use the\nmax between HFSPLUS_SECTOR_SIZE and min_io_size in case the latter is not\ninitialized.\n\nTested by mounting an hfsplus filesystem with loop block sizes 512, 1024\nand 4096.\n\nThe produced KASAN report before the fix looks like this:\n\n[ 419.944641] ==================================================================\n[ 419.945655] BUG: KASAN: slab-use-after-free in hfsplus_read_wrapper+0x659/0xa0a\n[ 419.946703] Read of size 2 at addr ffff88800721fc00 by task repro/10678\n[ 419.947612]\n[ 419.947846] CPU: 0 UID: 0 PID: 10678 Comm: repro Not tainted 6.12.0-rc5-00008-gdf56e0f2f3ca #84\n[ 419.949007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014\n[ 419.950035] Call Trace:\n[ 419.950384] <TASK>\n[ 419.950676] dump_stack_lvl+0x57/0x78\n[ 419.951212] ? hfsplus_read_wrapper+0x659/0xa0a\n[ 419.951830] print_report+0x14c/0x49e\n[ 419.952361] ? __virt_addr_valid+0x267/0x278\n[ 419.952979] ? kmem_cache_debug_flags+0xc/0x1d\n[ 419.953561] ? hfsplus_read_wrapper+0x659/0xa0a\n[ 419.954231] kasan_report+0x89/0xb0\n[ 419.954748] ? hfsplus_read_wrapper+0x659/0xa0a\n[ 419.955367] hfsplus_read_wrapper+0x659/0xa0a\n[ 419.955948] ? __pfx_hfsplus_read_wrapper+0x10/0x10\n[ 419.956618] ? do_raw_spin_unlock+0x59/0x1a9\n[ 419.957214] ? _raw_spin_unlock+0x1a/0x2e\n[ 419.957772] hfsplus_fill_super+0x348/0x1590\n[ 419.958355] ? hlock_class+0x4c/0x109\n[ 419.958867] ? __pfx_hfsplus_fill_super+0x10/0x10\n[ 419.959499] ? __pfx_string+0x10/0x10\n[ 419.960006] ? lock_acquire+0x3e2/0x454\n[ 419.960532] ? bdev_name.constprop.0+0xce/0x243\n[ 419.961129] ? __pfx_bdev_name.constprop.0+0x10/0x10\n[ 419.961799] ? pointer+0x3f0/0x62f\n[ 419.962277] ? __pfx_pointer+0x10/0x10\n[ 419.962761] ? vsnprintf+0x6c4/0xfba\n[ 419.963178] ? __pfx_vsnprintf+0x10/0x10\n[ 419.963621] ? setup_bdev_super+0x376/0x3b3\n[ 419.964029] ? snprintf+0x9d/0xd2\n[ 419.964344] ? __pfx_snprintf+0x10/0x10\n[ 419.964675] ? lock_acquired+0x45c/0x5e9\n[ 419.965016] ? set_blocksize+0x139/0x1c1\n[ 419.965381] ? sb_set_blocksize+0x6d/0xae\n[ 419.965742] ? __pfx_hfsplus_fill_super+0x10/0x10\n[ 419.966179] mount_bdev+0x12f/0x1bf\n[ 419.966512] ? __pfx_mount_bdev+0x10/0x10\n[ 419.966886] ? vfs_parse_fs_string+0xce/0x111\n[ 419.967293] ? __pfx_vfs_parse_fs_string+0x10/0x10\n[ 419.967702] ? __pfx_hfsplus_mount+0x10/0x10\n[ 419.968073] legacy_get_tree+0x104/0x178\n[ 419.968414] vfs_get_tree+0x86/0x296\n[ 419.968751] path_mount+0xba3/0xd0b\n[ 419.969157] ? __pfx_path_mount+0x10/0x10\n[ 419.969594] ? kmem_cache_free+0x1e2/0x260\n[ 419.970311] do_mount+0x99/0xe0\n[ 419.970630] ? __pfx_do_mount+0x10/0x10\n[ 419.971008] __do_sys_mount+0x199/0x1c9\n[ 419.971397] do_syscall_64+0xd0/0x135\n[ 419.971761] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 419.972233] RIP: 0033:0x7c3cb812972e\n[ 419.972564] Code: 48 8b 0d f5 46 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d c2 46 0d 00 f7 d8 64 89 01 48\n[ 419.974371] RSP: 002b:00007ffe30632548 EFLAGS: 00000286 ORIG_RAX: 00000000000000a5\n[ 419.975048] RAX: ffffffffffffffda RBX: 00007ffe306328d8 RCX: 00007c3cb812972e\n[ 419.975701] RDX: 0000000020000000 RSI: 0000000020000c80 RDI:\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-56548", url: "https://www.suse.com/security/cve/CVE-2024-56548", }, { category: "external", summary: "SUSE Bug 1234853 for CVE-2024-56548", url: "https://bugzilla.suse.com/1234853", }, { category: "external", summary: "SUSE Bug 1235073 for CVE-2024-56548", url: "https://bugzilla.suse.com/1235073", }, { category: "external", summary: "SUSE Bug 1235074 for CVE-2024-56548", url: "https://bugzilla.suse.com/1235074", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "important", }, ], title: "CVE-2024-56548", }, { cve: "CVE-2024-56570", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56570", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\novl: Filter invalid inodes with missing lookup function\n\nAdd a check to the ovl_dentry_weird() function to prevent the\nprocessing of directory inodes that lack the lookup function.\nThis is important because such inodes can cause errors in overlayfs\nwhen passed to the lowerstack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-56570", url: "https://www.suse.com/security/cve/CVE-2024-56570", }, { category: "external", summary: "SUSE Bug 1235035 for CVE-2024-56570", url: "https://bugzilla.suse.com/1235035", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "moderate", }, ], title: "CVE-2024-56570", }, { cve: "CVE-2024-56598", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56598", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: array-index-out-of-bounds fix in dtReadFirst\n\nThe value of stbl can be sometimes out of bounds due\nto a bad filesystem. Added a check with appopriate return\nof error code in that case.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-56598", url: "https://www.suse.com/security/cve/CVE-2024-56598", }, { category: "external", summary: "SUSE Bug 1235220 for CVE-2024-56598", url: "https://bugzilla.suse.com/1235220", }, { category: "external", summary: "SUSE Bug 1235221 for CVE-2024-56598", url: "https://bugzilla.suse.com/1235221", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "important", }, ], title: "CVE-2024-56598", }, { cve: "CVE-2024-56604", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56604", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc()\n\nbt_sock_alloc() attaches allocated sk object to the provided sock object.\nIf rfcomm_dlc_alloc() fails, we release the sk object, but leave the\ndangling pointer in the sock object, which may cause use-after-free.\n\nFix this by swapping calls to bt_sock_alloc() and rfcomm_dlc_alloc().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-56604", url: "https://www.suse.com/security/cve/CVE-2024-56604", }, { category: "external", summary: "SUSE Bug 1235056 for CVE-2024-56604", url: "https://bugzilla.suse.com/1235056", }, { category: "external", summary: "SUSE Bug 1235058 for CVE-2024-56604", url: "https://bugzilla.suse.com/1235058", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "important", }, ], title: "CVE-2024-56604", }, { cve: "CVE-2024-56605", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56605", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()\n\nbt_sock_alloc() allocates the sk object and attaches it to the provided\nsock object. On error l2cap_sock_alloc() frees the sk object, but the\ndangling pointer is still attached to the sock object, which may create\nuse-after-free in other code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-56605", url: "https://www.suse.com/security/cve/CVE-2024-56605", }, { category: "external", summary: "SUSE Bug 1234853 for CVE-2024-56605", url: "https://bugzilla.suse.com/1234853", }, { category: "external", summary: "SUSE Bug 1235061 for CVE-2024-56605", url: "https://bugzilla.suse.com/1235061", }, { category: "external", summary: "SUSE Bug 1235062 for CVE-2024-56605", url: "https://bugzilla.suse.com/1235062", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "important", }, ], title: "CVE-2024-56605", }, { cve: "CVE-2024-56619", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56619", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()\n\nSyzbot reported that when searching for records in a directory where the\ninode's i_size is corrupted and has a large value, memory access outside\nthe folio/page range may occur, or a use-after-free bug may be detected if\nKASAN is enabled.\n\nThis is because nilfs_last_byte(), which is called by nilfs_find_entry()\nand others to calculate the number of valid bytes of directory data in a\npage from i_size and the page index, loses the upper 32 bits of the 64-bit\nsize information due to an inappropriate type of local variable to which\nthe i_size value is assigned.\n\nThis caused a large byte offset value due to underflow in the end address\ncalculation in the calling nilfs_find_entry(), resulting in memory access\nthat exceeds the folio/page size.\n\nFix this issue by changing the type of the local variable causing the bit\nloss from \"unsigned int\" to \"u64\". The return value of nilfs_last_byte()\nis also of type \"unsigned int\", but it is truncated so as not to exceed\nPAGE_SIZE and no bit loss occurs, so no change is required.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-56619", url: "https://www.suse.com/security/cve/CVE-2024-56619", }, { category: "external", summary: "SUSE Bug 1235224 for CVE-2024-56619", url: "https://bugzilla.suse.com/1235224", }, { category: "external", summary: "SUSE Bug 1235225 for CVE-2024-56619", url: "https://bugzilla.suse.com/1235225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "important", }, ], title: "CVE-2024-56619", }, { cve: "CVE-2024-8805", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-8805", }, ], notes: [ { category: "general", text: "BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the HID over GATT Profile. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25177.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-8805", url: "https://www.suse.com/security/cve/CVE-2024-8805", }, { category: "external", summary: "SUSE Bug 1230697 for CVE-2024-8805", url: "https://bugzilla.suse.com/1230697", }, { category: "external", summary: "SUSE Bug 1240804 for CVE-2024-8805", url: "https://bugzilla.suse.com/1240804", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-01-24T10:10:55Z", details: "important", }, ], title: "CVE-2024-8805", }, ], }
gsd-2021-42327
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.
Aliases
Aliases
{ GSD: { alias: "CVE-2021-42327", description: "dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.", id: "GSD-2021-42327", references: [ "https://www.suse.com/security/cve/CVE-2021-42327.html", "https://ubuntu.com/security/CVE-2021-42327", "https://advisories.mageia.org/CVE-2021-42327.html", "https://security.archlinux.org/CVE-2021-42327", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2021-42327", ], details: "dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.", id: "GSD-2021-42327", modified: "2023-12-13T01:23:06.575295Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-42327", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c", refsource: "MISC", url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c", }, { name: "https://www.mail-archive.com/amd-gfx@lists.freedesktop.org/msg69080.html", refsource: "MISC", url: "https://www.mail-archive.com/amd-gfx@lists.freedesktop.org/msg69080.html", }, { name: "FEDORA-2021-a093973910", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/", }, { name: "https://security.netapp.com/advisory/ntap-20211118-0005/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20211118-0005/", }, { name: "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f23750b5b3d98653b31d4469592935ef6364ad67", refsource: "MISC", url: "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f23750b5b3d98653b31d4469592935ef6364ad67", }, ], }, }, "nvd.nist.gov": { cve: { configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "9CE21C53-A076-452E-9E54-04F00E3756C4", versionEndIncluding: "5.14.14", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", matchCriteriaId: "9F9C8C20-42EB-4AB5-BD97-212DEB070C43", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6770B6C3-732E-4E22-BF1C-2D2FD610061C", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", matchCriteriaId: "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7FFF7106-ED78-49BA-9EC5-B889E3685D53", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", matchCriteriaId: "B06F4839-D16A-4A61-9BB5-55B13F41E47F", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "56409CEC-5A1E-4450-AA42-641E459CC2AF", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*", matchCriteriaId: "7AFC73CE-ABB9-42D3-9A71-3F5BC5381E0E", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "108A2215-50FB-4074-94CF-C130FA14566D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*", matchCriteriaId: "803BC414-B250-4E3A-A478-A3881340D6B8", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "32F0B6C0-F930-480D-962B-3F4EFDCC13C7", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*", matchCriteriaId: "736AEAE9-782B-4F71-9893-DED53367E102", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0FEB3337-BFDE-462A-908B-176F92053CEC", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", matchCriteriaId: "8497A4C9-8474-4A62-8331-3FE862ED4098", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D0B4AD8A-F172-4558-AEC6-FF424BA2D912", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", matchCriteriaId: "CDDF61B7-EC5C-467C-B710-B89F502CD04F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], descriptions: [ { lang: "en", value: "dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.", }, { lang: "es", value: "la función dp_link_settings_write en el archivo drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c en el kernel de Linux versiones hasta 5.14.14, permite un desbordamiento de búfer en la región heap de la memoria por parte de un atacante que puede escribir una cadena en el sistema de archivos de depuración de los controladores de la GPU AMD. No se presentan comprobaciones de tamaño dentro de parse_write_buffer_into_params cuando usa el tamaño de copy_from_user para copiar un buffer de espacio de usuario en un buffer de pila de 40 bytes", }, ], id: "CVE-2021-42327", lastModified: "2024-03-25T01:15:51.437", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-10-21T17:15:07.913", references: [ { source: "cve@mitre.org", url: "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f23750b5b3d98653b31d4469592935ef6364ad67", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20211118-0005/", }, { source: "cve@mitre.org", url: "https://www.mail-archive.com/amd-gfx%40lists.freedesktop.org/msg69080.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }, }, }, }
ghsa-h79r-2wv4-r9g8
Vulnerability from github
Published
2022-05-24 19:18
Modified
2024-03-25 03:31
Severity ?
Details
dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.
{ affected: [], aliases: [ "CVE-2021-42327", ], database_specific: { cwe_ids: [ "CWE-787", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2021-10-21T17:15:00Z", severity: "HIGH", }, details: "dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.", id: "GHSA-h79r-2wv4-r9g8", modified: "2024-03-25T03:31:43Z", published: "2022-05-24T19:18:27Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-42327", }, { type: "WEB", url: "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f23750b5b3d98653b31d4469592935ef6364ad67", }, { type: "WEB", url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20211118-0005", }, { type: "WEB", url: "https://www.mail-archive.com/amd-gfx%40lists.freedesktop.org/msg69080.html", }, { type: "WEB", url: "https://www.mail-archive.com/amd-gfx@lists.freedesktop.org/msg69080.html", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
WID-SEC-W-2024-1372
Vulnerability from csaf_certbund
Published
2021-10-24 22:00
Modified
2024-06-12 22:00
Summary
Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein lokaler Angreifer kann eine Schwachstelle im Linux Kernel ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Der Kernel stellt den Kern des Linux Betriebssystems dar.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann eine Schwachstelle im Linux Kernel ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- UNIX", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-1372 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2024-1372.json", }, { category: "self", summary: "WID-SEC-2024-1372 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1372", }, { category: "external", summary: "Bugzilla Security Advisory vom 2021-10-24", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2016692", }, { category: "external", summary: "Red Hat Customer Portal vom 2021-10-24", url: "https://access.redhat.com/security/cve/CVE-2021-42327", }, { category: "external", summary: "Ubuntu Security Notice USN-5165-1 vom 2021-12-01", url: "https://ubuntu.com/security/notices/USN-5165-1", }, { category: "external", summary: "Ubuntu Security Notice USN-5265-1 vom 2022-02-03", url: "https://ubuntu.com/security/notices/USN-5265-1", }, { category: "external", summary: "Ubuntu Security Notice USN-5362-1 vom 2022-04-01", url: "https://ubuntu.com/security/notices/USN-5362-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2008-1 vom 2024-06-12", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018706.html", }, ], source_lang: "en-US", title: "Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff", tracking: { current_release_date: "2024-06-12T22:00:00.000+00:00", generator: { date: "2024-08-15T18:10:10.809+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2024-1372", initial_release_date: "2021-10-24T22:00:00.000+00:00", revision_history: [ { date: "2021-10-24T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2021-11-30T23:00:00.000+00:00", number: "2", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-02-02T23:00:00.000+00:00", number: "3", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-03-31T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-06-12T22:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, ], status: "final", version: "5", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<=5.14.14", product: { name: "Open Source Linux Kernel <=5.14.14", product_id: "6368", }, }, ], category: "product_name", name: "Linux Kernel", }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2021-42327", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Linux Kernel. Der Fehler besteht in \"dp_link_settings_write\" in der Datei \"drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c\" aufgrund eines Heap-basierten Pufferüberlaufs durch das Schreiben eines Strings in das Debug-Dateisystem des AMD GPU-Display-Treibers. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen nicht spezifizierten Angriff auszuführen.", }, ], product_status: { known_affected: [ "T002207", "T000126", ], last_affected: [ "6368", ], }, release_date: "2021-10-24T22:00:00.000+00:00", title: "CVE-2021-42327", }, ], }
wid-sec-w-2024-1372
Vulnerability from csaf_certbund
Published
2021-10-24 22:00
Modified
2024-06-12 22:00
Summary
Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein lokaler Angreifer kann eine Schwachstelle im Linux Kernel ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Der Kernel stellt den Kern des Linux Betriebssystems dar.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann eine Schwachstelle im Linux Kernel ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- UNIX", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-1372 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2024-1372.json", }, { category: "self", summary: "WID-SEC-2024-1372 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1372", }, { category: "external", summary: "Bugzilla Security Advisory vom 2021-10-24", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2016692", }, { category: "external", summary: "Red Hat Customer Portal vom 2021-10-24", url: "https://access.redhat.com/security/cve/CVE-2021-42327", }, { category: "external", summary: "Ubuntu Security Notice USN-5165-1 vom 2021-12-01", url: "https://ubuntu.com/security/notices/USN-5165-1", }, { category: "external", summary: "Ubuntu Security Notice USN-5265-1 vom 2022-02-03", url: "https://ubuntu.com/security/notices/USN-5265-1", }, { category: "external", summary: "Ubuntu Security Notice USN-5362-1 vom 2022-04-01", url: "https://ubuntu.com/security/notices/USN-5362-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2008-1 vom 2024-06-12", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018706.html", }, ], source_lang: "en-US", title: "Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff", tracking: { current_release_date: "2024-06-12T22:00:00.000+00:00", generator: { date: "2024-08-15T18:10:10.809+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2024-1372", initial_release_date: "2021-10-24T22:00:00.000+00:00", revision_history: [ { date: "2021-10-24T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2021-11-30T23:00:00.000+00:00", number: "2", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-02-02T23:00:00.000+00:00", number: "3", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-03-31T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-06-12T22:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, ], status: "final", version: "5", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<=5.14.14", product: { name: "Open Source Linux Kernel <=5.14.14", product_id: "6368", }, }, ], category: "product_name", name: "Linux Kernel", }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2021-42327", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Linux Kernel. Der Fehler besteht in \"dp_link_settings_write\" in der Datei \"drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c\" aufgrund eines Heap-basierten Pufferüberlaufs durch das Schreiben eines Strings in das Debug-Dateisystem des AMD GPU-Display-Treibers. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen nicht spezifizierten Angriff auszuführen.", }, ], product_status: { known_affected: [ "T002207", "T000126", ], last_affected: [ "6368", ], }, release_date: "2021-10-24T22:00:00.000+00:00", title: "CVE-2021-42327", }, ], }
fkie_cve-2021-42327
Vulnerability from fkie_nvd
Published
2021-10-21 17:15
Modified
2024-11-21 06:27
Severity ?
Summary
dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
fedoraproject | fedora | 35 | |
netapp | h300s_firmware | - | |
netapp | h300s | - | |
netapp | h500s_firmware | - | |
netapp | h500s | - | |
netapp | h700s_firmware | - | |
netapp | h700s | - | |
netapp | h300e_firmware | - | |
netapp | h300e | - | |
netapp | h500e_firmware | - | |
netapp | h500e | - | |
netapp | h700e_firmware | - | |
netapp | h700e | - | |
netapp | h410s_firmware | - | |
netapp | h410s | - | |
netapp | h410c_firmware | - | |
netapp | h410c | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "9CE21C53-A076-452E-9E54-04F00E3756C4", versionEndIncluding: "5.14.14", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6770B6C3-732E-4E22-BF1C-2D2FD610061C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", matchCriteriaId: "9F9C8C20-42EB-4AB5-BD97-212DEB070C43", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7FFF7106-ED78-49BA-9EC5-B889E3685D53", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", matchCriteriaId: "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "56409CEC-5A1E-4450-AA42-641E459CC2AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", matchCriteriaId: "B06F4839-D16A-4A61-9BB5-55B13F41E47F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "108A2215-50FB-4074-94CF-C130FA14566D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*", matchCriteriaId: "7AFC73CE-ABB9-42D3-9A71-3F5BC5381E0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "32F0B6C0-F930-480D-962B-3F4EFDCC13C7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*", matchCriteriaId: "803BC414-B250-4E3A-A478-A3881340D6B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0FEB3337-BFDE-462A-908B-176F92053CEC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*", matchCriteriaId: "736AEAE9-782B-4F71-9893-DED53367E102", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D0B4AD8A-F172-4558-AEC6-FF424BA2D912", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", matchCriteriaId: "8497A4C9-8474-4A62-8331-3FE862ED4098", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", matchCriteriaId: "CDDF61B7-EC5C-467C-B710-B89F502CD04F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.", }, { lang: "es", value: "la función dp_link_settings_write en el archivo drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c en el kernel de Linux versiones hasta 5.14.14, permite un desbordamiento de búfer en la región heap de la memoria por parte de un atacante que puede escribir una cadena en el sistema de archivos de depuración de los controladores de la GPU AMD. No se presentan comprobaciones de tamaño dentro de parse_write_buffer_into_params cuando usa el tamaño de copy_from_user para copiar un buffer de espacio de usuario en un buffer de pila de 40 bytes", }, ], id: "CVE-2021-42327", lastModified: "2024-11-21T06:27:36.903", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-10-21T17:15:07.913", references: [ { source: "cve@mitre.org", url: "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f23750b5b3d98653b31d4469592935ef6364ad67", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20211118-0005/", }, { source: "cve@mitre.org", url: "https://www.mail-archive.com/amd-gfx%40lists.freedesktop.org/msg69080.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f23750b5b3d98653b31d4469592935ef6364ad67", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20211118-0005/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.mail-archive.com/amd-gfx%40lists.freedesktop.org/msg69080.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.